This is the accessible text file for GAO report number GAO-10-142 
entitled 'Homeland Security: Greater Attention to Key Practices Would 
Improve the Federal Protective Service's Approach to Facility 
Protection' which was released on November 18, 2009. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to the Chairman, Committee on Homeland Security, House of 
Representatives: 

United States Government Accountability Office: 
GAO: 

October 2009: 

Homeland Security: 

Greater Attention to Key Practices Would Improve the Federal Protective 
Service's Approach to Facility Protection: 

GAO-10-142: 

GAO Highlights: 

Highlights of GAO-10-142, a report to the Chairman, Committee on 
Homeland Security, House of Representatives. 

Why GAO Did This Study: 

There is ongoing concern about the security of federal buildings and 
their occupants. The Federal Protective Service (FPS) within the 
Department of Homeland Security (DHS) is responsible for providing law 
enforcement and related security services for nearly 9,000 federal 
buildings under the control and custody of the General Services 
Administration (GSA). In 2004, GAO identified a set of key protection 
practices from the collective practices of federal agencies and the 
private sector that included: allocating resources using risk 
management, leveraging technology, and information sharing and 
coordination. As requested, GAO determined whether FPS’s security 
efforts for GSA buildings reflected key practices. To meet this 
objective, GAO used its key practices as criteria, visited five sites 
to gain firsthand knowledge, analyzed pertinent DHS and GSA documents, 
and interviewed DHS, GSA, and tenant agency officials. 

What GAO Found: 

FPS’s approach to securing GSA buildings reflects some aspects of key 
protection practices, and FPS has several improvements underway such as 
a new risk assessment program and a countermeasure acquisition program. 
While FPS’s protection activities exhibit some aspects of the key 
practices, GAO found limitations in each of the areas. 

FPS assesses risk and recommends countermeasures to GSA and tenant 
agencies; however, FPS’s ability to influence the allocation of 
resources using risk management is limited because resource allocation 
decisions are the responsibility of GSA and tenant agencies, which may 
be unwilling to fund FPS’s countermeasure recommendations. Moreover, 
FPS uses an outdated risk assessment tool and a subjective, time-
consuming process. As a result, GSA and tenant agencies are uncertain 
whether risks are being mitigated. Concerned with the quality and 
timeliness of FPS’s risk assessment services, GSA and tenant agencies 
are pursuing some of these activities on their own. Although FPS is 
developing a new risk management program, full implementation is not 
planned until the end of fiscal year 2011 and has already experienced 
delays. 

With regard to leveraging technology, FPS inspectors have considerable 
latitude for selecting technologies and countermeasures that tenant 
agencies fund, but FPS provides inspectors with little training and 
guidance for making cost-effective choices. Additionally, FPS does not 
provide tenant agencies with an analysis of alternative technologies, 
their cost, and associated reduction in risk. As a result, there is 
limited assurance that the recommendations inspectors make are the best 
available alternatives and tenant agencies must make resource 
allocation decisions without key information. Although FPS is 
developing a program to standardize security equipment and contracting, 
the program has run behind schedule and lacks an evaluative component 
for assessing the cost-effectiveness of competing technologies and 
countermeasures. 

FPS has developed information sharing and coordination mechanisms with 
GSA and tenant agencies, but there is inconsistency in the type of 
information shared and the frequency of coordination. Lack of 
coordination through regular contact can lead to communication 
breakdowns. For example, during a construction project at one location, 
the surveillance equipment that FPS was responsible for maintaining was 
removed from the site during 2007. FPS and tenant agency 
representatives disagree over whether FPS was notified of this action. 
Furthermore, FPS and GSA disagree over what building risk assessment 
information can be shared. FPS maintains that the sensitive information 
contained in the assessments is not needed for GSA to carry out its 
mission. However, GSA maintains that restricted access to the risk 
assessments constrains its ability to protect buildings and occupants. 

What GAO Recommends: 

GAO is making three recommendations to the Secretary of Homeland 
Security. These include instructing FPS to report regularly to the 
Secretary on its new risk management and countermeasures programs, 
develop guidance for cost-effectively leveraging technology, and 
determine information sharing parameters with GSA. DHS concurred with 
the report’s recommendations. 

View [hyperlink, http://www.gao.gov/products/GAO-10-142] or key 
components. For more information, contact Mark L. Goldstein at (202) 
512-2834 or goldsteinm@gao.gov. 

[End of section] 

Contents: 

Letter: 

Results in Brief: 

Background: 

FPS's Risk Management Approach Is Inadequate, but Improvements Are in 
Development: 

FPS Lacks a Systematic Approach for Leveraging Technology, but Is 
Developing a Technology Acquisition Program: 

FPS's Information Sharing and Coordination Practices Lack Consistency: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Appendix I: Objectives, Scope, and Methodology: 

Appendix II: Comments from the Department of Homeland Security: 

Appendix III: Comments from the General Services Administration: 

Appendix IV: GAO Contact and Staff Acknowledgments: 

Abbreviations: 

BSA: building security assessment: 

BSC: building security committee: 

DHS: Department of Homeland Security: 

DOJ: Department of Justice: 

FAS: Federal Acquisition Service: 

FPS: Federal Protective Service: 

GSA: General Services Administration: 

HSPD-7: Homeland Security Presidential Directive 7: 

HSPD-12: Homeland Security Presidential Directive 12: 

ICE: U.S. Immigration and Customs Enforcement: 

ISC: Interagency Security Committee: 

LES: Law Enforcement Sensitive: 

MOA: memorandum of agreement: 

NIPP: National Infrastructure Protection Plan: 

NPPD: National Protection and Programs Directorate: 

PBS: Public Buildings Service: 

RAMPART: Risk Assessment Methodology Property Analysis and Ranking 
Tool: 

RAMP: Risk Assessment and Management Program: 

SBU: Sensitive But Unclassified: 

SWA: Security Work Authorization: 

[End of section] 

United States Government Accountability Office: 
Washington, DC 20548: 

October 23, 2009: 

The Honorable Bennie G. Thompson:
Chairman:
Committee on Homeland Security:
House of Representatives: 

Dear Mr. Chairman: 

Concerns persist about the security of federal buildings, their 
occupants, and visitors to these buildings. The Federal Protective 
Service (FPS) provides law enforcement and related security services 
for the nearly 9,000 buildings that are under the control and custody 
of the General Services Administration (GSA). FPS's services include-- 
but are not limited to--responding to incidents and demonstrations, 
conducting risk assessments, participating in meetings with GSA 
property managers and tenant agencies, and determining whether GSA 
buildings are compliant with security standards established by the 
Interagency Security Committee (ISC).[Footnote 1] GSA serves as the 
federal government's landlord and designs, builds, and manages 
facilities to support the needs of other federal agencies. Until 2003, 
FPS was a component of GSA's Public Buildings Service (PBS), but the 
Homeland Security Act of 2002 transferred FPS to the Department of 
Homeland Security (DHS)[Footnote 2] and DHS placed FPS within U.S. 
Immigration and Customs Enforcement (ICE). Under the act, FPS retained 
its law enforcement and related security functions for GSA buildings 
and grounds, while GSA retained its powers, functions, and authorities 
related to the operation, maintenance, and protection of GSA buildings 
and grounds.[Footnote 3] To guide the transition, DHS and GSA developed 
a Memorandum of Agreement (MOA) to set forth roles, responsibilities, 
and operational relationships between FPS and GSA concerning the 
protection of GSA buildings. Additionally, in 2006, GSA established a 
security division within PBS to oversee its security operations and 
policies and liaise with FPS. The President's Budget for Fiscal Year 
2010 proposed transferring FPS from ICE to the National Protection and 
Programs Directorate (NPPD) within DHS.[Footnote 4] 

We have identified a set of key facility protection practices from the 
collective practices of federal agencies and the private sector to 
provide a framework for guiding agencies' protection efforts and 
addressing challenges.[Footnote 5] In this report, we use these key 
practices to evaluate how FPS protects GSA buildings. The key practices 
essentially form the foundation of a comprehensive approach to building 
protection.[Footnote 6] ISC is using our key facility protection 
practices to guide its priorities and work activities. We focused on 
the following three key practices for this report:[Footnote 7] 

* Allocating resources using risk management. Identify threats, assess 
vulnerabilities, and determine critical assets to protect and use 
information on these and other elements to develop countermeasures and 
prioritize the allocation of resources as conditions change. 

* Leveraging technology. Select technologies to enhance asset security 
through methods like access control, detection, and surveillance 
systems. This involves not only using technology, but ensuring that 
there are positive returns on investment in the form of reduced 
vulnerabilities. 

* Information sharing and coordination. Establish means of coordinating 
and sharing security and threat information internally, within large 
organizations, and externally, with other government entities and the 
private sector. 

You requested that we determine whether FPS's approach to securing GSA 
buildings reflects key facility protection practices. In response, on 
July 29, 2009, we issued a sensitive but unclassified report. As that 
report contained information that was deemed to be either law 
enforcement sensitive or for official use only, this version of the 
report is intended to communicate our findings and recommendations as 
related to each of the key practices that we reviewed while omitting 
sensitive information about building security, including specific 
vulnerabilities. 

To meet the objective, we used the three key practices cited above as a 
framework for assessing facility protection efforts by FPS management 
and at the individual buildings. In doing our work, we reviewed 
pertinent documents and policies from FPS and GSA, related laws and 
directives, ISC's security standards, and prior and ongoing GAO work. 
We also interviewed FPS and GSA officials at the national and regional 
levels, and the ISC executive director. We selected five sites to 
illustrate how FPS protects highly visible GSA buildings, basing our 
selection on factors that included geographical diversity, occupancy, 
the building's security level,[Footnote 8] and other potential security 
considerations, such as new or planned construction. Selected sites 
included three multi-tenant level IV buildings,[Footnote 9] one single- 
tenant level IV campus,[Footnote 10] and one single-tenant level III 
campus.[Footnote 11] 

At these sites, we collected documentation and interviewed officials 
from FPS, GSA, and tenant agencies. To supplement these site visits, we 
interviewed FPS and GSA security officials from the four regions where 
we had visited buildings. Because we observed FPS's efforts to protect 
GSA buildings at a limited number of sites, our observations of 
security issues at specific buildings cannot be generalized to all the 
buildings that FPS is responsible for securing. We conducted this 
performance audit from January 2008 to September 2009 in accordance 
with generally accepted government auditing standards. Those standards 
require that we plan and perform the audit to obtain sufficient, 
appropriate evidence to provide a reasonable basis for our findings and 
conclusions based on our audit objectives. We believe that the evidence 
obtained provides a reasonable basis for our findings and conclusions 
based on our audit objectives. Appendix I contains a more detailed 
discussion of our scope and methodology. 

Results in Brief: 

FPS's approach to securing GSA buildings reflects some aspects of the 
key facility protection practices we examined--allocating resources 
using risk management, leveraging technology, and information sharing 
and coordination--but we also found significant limitations. FPS 
recognizes the importance of making progress in these areas and has 
improvements underway that could bring its activities more in line with 
the key practices and better equip FPS to address security 
vulnerabilities at GSA-controlled federal buildings. For example, FPS 
is developing a new risk assessment tool and standardizing technology 
acquisition. However, until these measures are fully implemented, FPS 
will continue to rely on its current methods, which fall short of a 
comprehensive approach to facility protection rooted in key practices. 
More specifically: 

* FPS assesses risk and recommends countermeasures to GSA and tenant 
agencies; however, FPS's ability to influence the allocation of 
resources using risk management is limited because resource allocation 
decisions are the responsibility of GSA and tenant agencies, which may 
be unwilling to fund FPS's countermeasure recommendations. We have 
found that under this approach, the security equipment that FPS 
recommends and is responsible for acquiring, installing, and 
maintaining may not be implemented if tenant agencies are unwilling to 
fund it. For example, one location shared a surveillance system with an 
adjacent federal location, and while one building security committee 
(BSC) agreed to fund a surveillance system upgrade that FPS had 
recommended, the BSC of the other location would not, thus adversely 
affecting the security of both locations. Compounding this situation, 
FPS takes a building-by-building approach to risk management, using an 
outdated risk assessment tool to create building security assessments 
(BSA), rather than taking a more comprehensive, strategic approach and 
assessing risks among all buildings in GSA's inventory and recommending 
countermeasure priorities to GSA and tenant agencies. As a result, the 
current approach provides less assurance that the most critical risks 
at federal buildings across the country are being prioritized and 
mitigated. Also, GSA and tenant agencies have concerns about the 
quality and timeliness of FPS's risk assessment services and are taking 
steps to obtain their own risk assessments. FPS is developing a new 
risk management program that is intended to incorporate a new risk 
assessment tool and be less subjective and time-consuming. However, 
according to FPS's plans, this program will not be fully implemented 
until the end of fiscal year 2011, and its development has already been 
delayed. 

* Leveraging technology is a key practice over which FPS has somewhat 
more control. Individual FPS inspectors have considerable latitude in 
determining which technologies and other countermeasures to recommend, 
but the inspectors receive little training and guidance in how to 
assess the relative cost-effectiveness of these technologies or 
determine the expected return on investment. Moreover, the document 
that FPS uses to convey its countermeasure recommendations to GSA and 
tenant agencies--the BSA executive summary--includes cost estimates but 
no analysis of alternatives. As a result, GSA and tenant agencies have 
limited assurance that the investments in technologies and other 
countermeasures that FPS inspectors recommend are cost-effective, 
consistent across buildings, and the best available alternatives. At 
one location, for example, FPS recommended that in addition to using an 
explosives detection dog to screen mail, an enhanced X-ray machine 
should be used to detect additional hazardous agents to lower the 
threat level. However, FPS did not include a cost analysis of the 
countermeasure and risk options in the BSA executive summary, leaving 
tenant agency representatives without key information for making a 
decision with cost and risk implications. FPS is developing a program 
to standardize its security equipment recommendations and contracting, 
but until the program is fully implemented, individual inspectors will 
continue to make recommendations based on individual judgment and 
information from vendors. In addition, FPS had planned to implement the 
new program during fiscal year 2009, but extended full implementation 
into fiscal year 2010. Moreover, the program does not provide for 
assessing the cost-effectiveness of competing technologies and 
countermeasures. 

* Information sharing and coordination occur in a variety of ways, and 
FPS and GSA top management have established communication channels. 
However, the types of information shared at the regional and building 
levels are inconsistent, and FPS and GSA disagree over what information 
should be shared. For example, the MOA between DHS and GSA specifies 
that FPS will provide quarterly briefings at the regional level, but 
FPS had not been providing them consistently across all regions. FPS 
resumed the practice in October 2008, however, GSA security officials 
said that these briefings mostly focused on crime statistics and did 
not constitute comprehensive threat analyses. Additionally, FPS is only 
required to meet formally with GSA property managers and tenant 
agencies as part of the BSA process--an event that occurs every 2 to 5 
years, depending on a building's security level. Lack of coordination 
through regular contact can lead to communication breakdowns. For 
example, at one location, FPS, GSA, and tenant agency representatives 
did not all meet together regularly during a large-scale construction 
project and surveillance equipment that FPS was responsible for was 
removed in 2007. During our visit in 2008, FPS officials told us they 
had not been notified of the action and had not recovered the 
equipment, but tenant agency representatives maintained there had been 
coordination with FPS. Furthermore, we found that FPS generally does 
not share complete BSAs with GSA because FPS believes GSA does not meet 
the standards under which FPS shares sensitive law enforcement 
information. GSA security officials maintain that this restriction on 
their access to security information constrains GSA's ability to 
protect its buildings and their occupants and is seeking a 
clarification on access to BSAs as part of the MOA renegotiation with 
FPS. However, FPS officials told us that they do not intend to change 
this information sharing procedure during negotiations. We also found 
that information sharing is constrained when FPS's radios are not 
interoperable with other law enforcement agencies' radios and FPS 
cannot communicate directly with the other agencies when responding to 
incidents. While FPS is taking steps to improve interoperability, it is 
too soon to tell whether FPS will achieve its goal in accordance with 
established timelines. 

Without greater attention to the key practices, FPS will be ill- 
equipped to efficiently and effectively fulfill its responsibilities of 
assessing risk, recommending countermeasures, and sharing information 
and coordinating with GSA and tenant agencies to secure GSA buildings 
as the security landscape changes and as new threats emerge. 
Accordingly, we are making recommendations designed to move FPS toward 
greater application of key practices and complete implementation of 
planned improvements. Specifically, the Secretary of Homeland Security 
should instruct the Director of FPS, in consultation, where 
appropriate, with other parts of DHS, GSA, and tenant agencies to (1) 
report regularly to the Secretary on the status of new risk management 
and countermeasure program activities; (2) develop a methodology and 
guidance for assessing and comparing the cost-effectiveness of 
technology alternatives; and (3) work with GSA to determine what 
information contained in the BSA is needed for GSA to protect buildings 
and occupants. We provided a draft of the sensitive but unclassified 
report to DHS and GSA for official review and comment. DHS agreed with 
our assessment that greater attention to key practices would improve 
FPS's approach to facility protection and agreed with the report's 
recommendations. GSA agreed with our findings concerning the challenges 
that FPS faces in delivering security services for GSA buildings. DHS's 
comments can be found in appendix II and GSA's comments can be found in 
appendix III. DHS also provided technical comments that we 
incorporated, where appropriate. 

Background: 

FPS was created in 1971 and located within GSA until, under the 
Homeland Security Act of 2002, it was transferred to DHS and placed 
within ICE, effective March 1, 2003. Under the act, FPS is authorized 
to protect the buildings, grounds, and property that are under the 
control and custody of GSA and the persons on the property.[Footnote 
12] FPS is authorized to enforce federal laws and regulations aimed at 
protecting GSA buildings and persons on the property and to investigate 
offenses against these buildings and persons. DHS and GSA developed an 
MOA to set forth roles, responsibilities, and operational relationships 
between FPS and GSA concerning the security of GSA buildings. In 
accordance with the MOA, FPS inspectors[Footnote 13] are responsible 
for performing a range of law enforcement and security duties at GSA 
buildings, including: 

* patrolling the building perimeter,[Footnote 14] 

* responding to incidents and demonstrations, 

* completing risk assessments for buildings[Footnote 15] and space that 
GSA is considering leasing,[Footnote 16] 

* recommending countermeasures, 

* participating in meetings with GSA property managers and tenant 
agency representatives, and: 

* overseeing contract guard operations.[Footnote 17] 

The level of physical protection services FPS provides at each of the 
9,000 GSA buildings varies depending on the building's security level. 
To determine a building's security level, FPS uses the Department of 
Justice (DOJ) vulnerability assessment guidelines, which categorize 
federal buildings into security levels I through V based on factors 
such as building size and number of employees.[Footnote 18] The DOJ 
standards recommend minimum security measures for each of the five 
levels and FPS uses these standards and other information to recommend 
countermeasures. The DOJ standards also require FPS to complete BSAs 
[Footnote 19] every 2 to 4 years, depending on the security level of 
the building.[Footnote 20] For example, a BSA is to be completed every 
2 years for a level IV building and every 4 years for a level I 
building. As part of each assessment, the inspector is required to 
conduct an on-site physical security analysis using FPS's risk 
assessment tool, known as Federal Security Risk Manager, and interview 
tenant agency security representatives, GSA realty specialists, site 
security supervisors, and building managers. After completing their 
assessments, inspectors make recommendations to GSA and tenant agencies 
for building security countermeasures,[Footnote 21] including security 
equipment[Footnote 22] and security fixtures.[Footnote 23] Tenant 
agencies decide whether to fund countermeasures recommended for 
security equipment and FPS is responsible for acquiring, installing, 
and maintaining approved equipment. GSA and tenant agencies determine 
whether to fund recommended security fixtures and GSA is responsible 
for acquiring, installing, and maintaining approved fixtures.[Footnote 
24] In some cases, and in accordance with its policies, FPS has 
delegated the protection of buildings to tenant agencies, which may 
have their own law enforcement authority or may contract separately for 
guard services. 

FPS is a fully reimbursable agency--that is, its services are fully 
funded by security fees collected from tenant agencies. FPS charges 
each tenant agency a basic security fee per square foot of space 
occupied in a GSA building. In fiscal year 2009, the basic security fee 
is 66 cents per square foot and covers services such as patrolling the 
building perimeter, monitoring building perimeter alarms, dispatching 
law enforcement officers through its control centers, conducting 
criminal investigations, and performing BSAs. FPS also collects an 
administrative fee that it charges tenant agencies for building- 
specific security services, such as controlling access to building 
entrances and exits and checking employees and visitors. In fiscal year 
2009, the fee rate for building-specific expenses is 8 percent. In 
addition to these security services, FPS provides tenant agencies with 
additional services upon request, which are funded through reimbursable 
security work authorizations (SWA) for which FPS charges an 
administrative fee. For example, tenant agencies fund FPS's security 
equipment countermeasure recommendations that they approve through 
SWAs. In fiscal year 2009, the SWA fee rate is 8 percent. 

Since transferring to DHS, FPS's mission has expanded beyond solely 
protecting GSA buildings to include homeland security activities, such 
as implementing homeland security directives, and providing law 
enforcement, security, and emergency response services during natural 
disasters and special events. For example, FPS serves as the sector- 
specific agency for the Government Facilities critical infrastructure 
sector under Homeland Security Presidential Directive 7 (HSPD-7). 
[Footnote 25] Additionally, DHS has authority under the Homeland 
Security Act to engage FPS in activities DHS deems necessary to enhance 
homeland security. For example, FPS can be called upon to assist the 
Federal Emergency Management Agency in responding to natural disasters, 
and provide backup to other DHS law enforcement units during special 
events, such as political demonstrations. According to FPS, it is 
reimbursed for these supportive services. 

We have previously identified challenges that raised concerns about 
FPS's protection of GSA buildings and tenants. In 2004, we reported on 
the challenges FPS faced in transitioning from GSA to DHS, including 
issues related to expanding responsibilities and funding.[Footnote 26] 
In June 2008, we reported on a range of operational and funding 
challenges facing FPS.[Footnote 27] We found that the operational 
challenges we identified hampered FPS's ability to accomplish its 
mission of protecting GSA buildings and the actions it took may not 
have fully resolved the challenges. For example, the number of FPS 
staff decreased by about 20 percent between fiscal year 2004 and fiscal 
year 2007. We found that FPS managed these decreases in staffing 
resources in a way that diminished security and increased the risk of 
crime and terrorist attacks at many GSA buildings. We further reported 
that the actions FPS took to address its funding challenges had some 
adverse implications. For example, during fiscal years 2005 and 2006, 
FPS's projected expenses exceeded its collections, and DHS had to 
transfer funds to make up the difference. We also found that although 
FPS had developed output measures, it lacked outcome measures to assess 
the effectiveness of its efforts to protect GSA buildings. Moreover, 
FPS lacked a reliable data management system for accurately tracking 
performance measures. 

As the federal government's landlord, GSA designs, builds, manages, and 
safeguards buildings to support the needs of other federal agencies. 
Under the Homeland Security Act of 2002--although FPS was transferred 
to DHS along with its responsibility to perform law enforcement and 
related security functions for GSA buildings--GSA also retained some 
property protection responsibilities. The Homeland Security Act of 2002 
stated that: 

"Nothing in this chapter may be construed to affect the functions or 
authorities of the Administrator of General Services with respect to 
the operation, maintenance, and protection of buildings and grounds 
owned or occupied by the Federal Government and under the jurisdiction, 
custody, or control of the Administrator. Except for the law 
enforcement and related security functions transferred under section 
203(3) of this title, the Administrator shall retain all powers, 
functions, and authorities vested in the Administrator under chapter 1, 
except section 121(e)(2)(A), and chapters 5 to 11 of Title 40, and 
other provisions of law that are necessary for the operation, 
maintenance, and protection of such buildings and grounds."[Footnote 
28] 

In response to a 2005 GAO recommendation[Footnote 29] and to enhance 
coordination with FPS, GSA established the Building Security and Policy 
Division within the Public Buildings Service (PBS)--where FPS once 
resided--in 2006.[Footnote 30] This division has three primary 
branches: 

* Building Security Policy--develops GSA security policies. 

* Building Security Operations--interfaces with FPS and monitors the 
services FPS provides to GSA and tenant agencies. 

* Physical Security--provides physical security expertise, training, 
and guidance to GSA leadership, regional staff, and tenant agencies. 

During 2006, the division developed the Regional Security Network, 
which consists of several staff per GSA region to further enhance 
coordination with FPS at the regional and building levels, and to carry 
out GSA security policy in collaboration with FPS and tenant agencies. 

In 1995, Executive Order 12977 established the ISC to enhance the 
quality and effectiveness of security in, and protection of, 
nonmilitary buildings occupied by federal employees in the United 
States. ISC has representation from all federal cabinet-level 
departments and other agencies and key offices, including GSA and FPS. 
[Footnote 31] Furthermore, ISC was established as a permanent body to 
address continuing government security issues for federal buildings. 
Under the order, ISC became responsible for developing policies and 
standards, ensuring compliance and overseeing implementation, and 
sharing and maintaining information. Executive Order 13286 transferred 
the ISC Chair from GSA to DHS.[Footnote 32] In 2004, we assessed ISC's 
progress in fulfilling its responsibilities.[Footnote 33] 

We have identified a set of key facility protection practices from the 
collective practices of federal agencies and the private sector to 
provide a framework for guiding agencies' protection efforts and 
addressing challenges.[Footnote 34] We focused on the following three 
key practices for this report: (1) allocating resources using risk 
management; (2) leveraging technology; and (3) information sharing and 
coordination. We have used the key practices to evaluate the efforts of 
the Smithsonian Institution to protect its assets,[Footnote 35] of DHS 
to protect its facilities,[Footnote 36] and of federal entities to 
protect icons and facilities on the National Mall.[Footnote 37] 
Moreover, ISC is using our key facility protection practices as key 
management practices to guide its priorities and work activities. For 
example, ISC established subcommittees for technology best practices 
and training, and working groups in the areas of performance measures 
and strategic human capital management. ISC also issued performance 
measurement guidance in 2009.[Footnote 38] 

FPS's Risk Management Approach Is Inadequate, but Improvements Are in 
Development: 

FPS is limited in its ability to influence the allocation of resources 
using risk management because security funding decisions are the 
responsibility of GSA and tenant agencies. Moreover, FPS uses an 
outdated risk assessment tool, a subjective approach, and a time- 
consuming process to conduct BSAs. GSA and tenant agencies have 
concerns about the quality and timeliness of FPS's risk assessment 
services and in some cases, are assuming these responsibilities. 
Although FPS is taking steps to implement a new risk management 
program, it is unclear when all program components--such as risk 
assessment tools--will be fully implemented as FPS has extended initial 
implementation from fiscal year 2009 into fiscal year 2010. FPS's new 
risk management program could help GSA and tenant agencies refine their 
resource allocation decisions if risk assessments are enhanced and FPS 
can help GSA and tenant agencies prioritize risks among all buildings. 
Until the risk management program is implemented, FPS will continue to 
use its current approach, which may leave some buildings and tenants 
vulnerable to terrorist attacks and crime. 

FPS's Ability to Influence Resource Allocation Based on Risk is 
Limited: 

FPS's ability to influence the allocation of resources based on the 
results of its risk assessments is constrained because GSA and tenant 
agencies must agree to fund recommended countermeasures, and we found 
that tenant agencies were sometimes unwilling to fund recommended 
security equipment. We have reported that a risk management approach to 
building protection generally involves identifying potential threats, 
assessing vulnerabilities, and evaluating mitigation alternatives for 
their likely effect on risk and their cost.[Footnote 39] Incorporating 
information on these elements, a strategy for allocating security- 
related resources is developed, implemented, and reevaluated over time 
as conditions change. Through the risk assessment process, FPS 
inspectors make recommendations for security fixtures and equipment 
which they include in BSA executive summaries that FPS is required to 
share with GSA and tenant agencies. GSA and tenant agencies determine 
whether to fund recommended security fixtures and GSA is responsible 
for acquiring, installing, and maintaining approved fixtures. Tenant 
agencies determine whether to fund recommended security equipment and 
FPS is responsible for acquiring, installing, and maintaining security 
equipment. However, tenant agencies may be unwilling to approve FPS's 
security equipment countermeasure recommendations, in which case FPS 
views them as choosing to accept the risk. According to officials we 
spoke with from FPS, GSA, and tenant agencies, tenant agencies may not 
approve FPS's security equipment countermeasure recommendations for 
several reasons: 

* Tenant agencies may not have the security expertise needed to make 
risk-based decisions. 

* Tenant agencies may find the associated costs prohibitive. 

* The timing of the BSA process may be inconsistent with tenant 
agencies' budget cycles. 

* Consensus may be difficult to build among multiple tenant agencies. 

* Tenant agencies may lack a complete understanding of why recommended 
countermeasures are necessary because they do not receive BSAs in their 
entirety. 

For example, in August 2007, FPS recommended a security equipment 
countermeasure--the upgrade of a surveillance system shared by two 
locations that, according to FPS officials, would cost around $650,000. 
While members of one BSC told us they approved spending between 
$350,000 and $375,000 to fund their agencies' share of the 
countermeasure, they said that the BSC of the other location would not 
approve funding; therefore, FPS could not upgrade the system it had 
recommended. In November 2008, FPS officials told us that they were 
moving ahead with the project by drawing on unexpended revenues from 
the two locations' building-specific fees and the funding that was 
approved by one of the BSCs. In May 2009, FPS officials told us that 
all cameras had been repaired and all monitoring and recording devices 
had been replaced, and that the two BSCs had approved additional 
upgrades and that FPS was implementing them. As we reported in June 
2008, we have found other instances in which recommended security 
countermeasures were not implemented at some of the buildings we 
visited because BSC members could not agree on which countermeasures to 
implement or were unable to obtain funding from their agencies. 
[Footnote 40] 

FPS's Current Approach to Risk Management Is Outdated, Subjective, and 
Time-consuming: 

Complicating the issue of FPS's limitations in influencing risk-based 
resource allocation decisions, FPS inspectors use an outdated risk 
assessment tool, known as Federal Security Risk Manager, to produce 
BSAs which are also vulnerable to inspector error and subjectivity and 
can take a considerable amount of time to complete. GSA originally 
developed the risk assessment tool in the late 1990s when FPS was a 
part of GSA and updated it in 2002, and it moved with FPS when it was 
transferred to DHS in 2003. FPS has identified problems with the risk 
assessment tool and overall approach to developing BSAs, including: 

* The risk assessment tool contributes to BSA subjectivity because it 
lacks a rigorous risk assessment methodology. For example, the tool 
does not incorporate ISC standards or the National Infrastructure 
Protection Plan (NIPP) framework,[Footnote 41] therefore, inspectors 
must apply ISC standards during their reviews of BSAs produced from the 
risk assessment tool and modify these reports in accordance with the 
standards. 

* Inspectors' compliance with BSA policies and procedures is 
inconsistent and inspectors must search for risk information from 
different sources and perform duplicative data entry tasks making it 
difficult for inspectors to focus fully on the needs of GSA and tenant 
agencies. Additionally, inspectors record risk assessment findings on 
paper-based forms and then transfer data to the risk assessment tool 
and other systems manually, potentially introducing errors during the 
transfer. 

We concur with FPS's findings and also believe the discretion given to 
inspectors in FPS's risk assessment approach provides less assurance 
that vulnerabilities are being consistently identified and mitigated. 
Without consistent application of risk assessment procedures, FPS 
cannot assure GSA and tenant agencies that expenditures to implement 
its recommendations are necessary. Furthermore, FPS's reliance on an 
outdated risk assessment tool provides less assurance that risks and 
mitigation strategies are adequately identified. 

We have previously reported on other concerns about FPS's risk 
assessment tool.[Footnote 42] For example, the tool does not allow FPS 
to compare risks from building to building so that FPS, GSA, and tenant 
agencies can prioritize security improvements among the nearly 9,000 
buildings within GSA's inventory. The ability to compare risks among 
all buildings is important because it could allow FPS, GSA, and tenant 
agencies to comprehensively identify and prioritize risks and 
countermeasure recommendations at a national level and direct resources 
toward alleviating them. We also reported that the risk assessment tool 
does not allow FPS to further refine security improvement priorities 
based on more precise risk categories--rather than the high, medium, or 
low categories FPS inspectors use under the current system. 
Furthermore, we reported that the risk assessment tool does not allow 
FPS to track the implementation status of security recommendations 
based on assessments.[Footnote 43] Without this ability, FPS has 
difficulty determining the extent to which identified vulnerabilities 
at GSA buildings have been mitigated. 

Considering the steps involved, it can also take several months for FPS 
to complete a BSA. Some of these steps include: 

* conducting an on-site physical security survey, 

* interviewing representatives from GSA and tenant agencies (an 
inspector may need to visit a site multiple times to meet with all 
pertinent officials), 

* entering survey and interview results into the risk assessment tool 
and other systems such as the Security Tracking System, 

* producing a BSA document that undergoes several layers of review and 
approval, and: 

* briefing representatives of tenant agencies and GSA on the BSA 
results and distributing the executive summary to them. 

An FPS supervisory officer told us that it took an average of 3 months 
to complete a BSA. The officer explained that it may take 2 to 5 weeks 
for an inspector to complete a security survey, interviews, and a BSA 
document. The officer gave an example that for one of the buildings 
within the region, an inspector must interview representatives from 30 
tenant agencies. In another example, we found that an FPS inspector had 
completed a BSA report for one location in April 2008, but at the time 
of our visit in August 2008 the document was still undergoing 
supervisory review and tenant agency representatives and GSA had not 
yet been briefed on the results or received a copy of the executive 
summary.[Footnote 44] Furthermore, inspectors are responsible for 
conducting BSAs for multiple buildings. The inspectors we interviewed 
were each responsible for conducting BSAs and overseeing security 
operations at between 1 and 20 buildings. 

GSA and Tenant Agencies Are Assuming More Security Responsibilities: 

GSA security officials at the national and regional levels that we met 
with were concerned about the quality and timeliness of the risk 
assessment services that FPS provides. Officials explained that GSA 
created the current risk assessment tool hastily following the 1995 
bombing of the Alfred P. Murrah Federal Building and that FPS inherited 
a flawed tool when it moved to DHS. GSA security officials expressed 
concerns over the quality of FPS's BSAs. For example, GSA regional 
security officials told us that an FPS inspector recommended that GSA 
remove a structure from a building, because the inspector thought it 
blocked the view of the security guards. However, according to these 
officials, FPS had not cited this blocked view as a vulnerability or 
recommended the structure's removal in previous BSAs, and to their 
knowledge, there had been no significant changes in identified threats, 
the space, or the building's tenant composition. GSA security officials 
also told us that they have had difficulties receiving timely risk 
assessments from FPS for space that GSA is considering leasing. These 
risk assessments must be completed before GSA can take possession of 
the property and lease it to tenant agencies. An inefficient risk 
assessment process for new lease projects can add costs for GSA and 
create problems for both GSA and tenant agencies that have been 
planning for a move. ICE officials told us that there are many 
occasions where FPS is not notified by GSA of the need for a new lease 
assessment and in some cases, tenants have moved into leased space 
without FPS's knowledge. GSA is updating a tool--the Risk Assessment 
Methodology Property Analysis and Ranking Tool (RAMPART)[Footnote 45]--
that it began developing in 1998, but has not recently used, to better 
ensure the timeliness and comprehensiveness of these risk assessments. 
GSA expects to test and implement the system during fiscal year 2009. 
GSA security officials told us that they may use RAMPART for other 
physical security activities, such as conducting other types of risk 
assessments and determining security countermeasures for new 
facilities. 

The tenant agency officials we spoke with at the five sites did not 
raise concerns about FPS's risk assessment process, but all of them 
told us that at the national level, their agencies were taking steps to 
pursue their own risk assessments for the exterior of their buildings, 
even though they pay FPS for this service. GSA security officials said 
they have seen an increase in the number of tenant agencies conducting 
their own risk assessments. They told us that they are aware of at 
least nine tenant agencies that are taking steps to acquire risk 
assessments for the exterior of their buildings. Additionally, we have 
previously reported that some tenant agencies had told us that they 
were using or planned to find contractors to complete additional risk 
assessments because of concerns about the quality and timeliness of 
FPS's BSAs.[Footnote 46] We also reported that several DHS components 
and other tenant agencies were taking steps to acquire their own risk 
assessments because FPS's assessments were not always timely or 
adequate. Similarly, we also found that many facilities had received 
waivers from FPS to enable the agencies to complete their own risk 
assessments.[Footnote 47] While tenant agencies have typically taken 
responsibility for assessing risk and securing the interior of their 
buildings, assessing exterior risks will require additional expertise 
and resources. This is an inefficient approach considering that tenant 
agencies are paying FPS to assess building security. However, ICE 
officials stated that in many cases, the agencies that are pursuing 
risk assessments are doing so to include both GSA and non-GSA buildings 
that they occupy, and that in other instances, agencies must adhere to 
other physical security standards and thus conduct their own 
assessments. 

FPS Is Developing a New Risk Assessment Tool and Implementing Updated 
Security Standards: 

FPS recognizes the inadequacies of its risk assessment tool, 
methodology, and process and is taking steps to develop a new risk 
management program. Specifically, FPS is developing the Risk Assessment 
and Management Program (RAMP) to improve the effectiveness of FPS's 
risk management approach and the quality of BSAs. According to FPS, 
RAMP will provide inspectors with the information needed to make more 
informed and defensible recommendations for security countermeasures. 
FPS also anticipates that RAMP will allow inspectors to obtain 
information from one electronic source, generate reports automatically, 
enable FPS to track selected countermeasures throughout their life 
cycle, address some concerns about the subjectivity inherent in BSAs, 
and reduce the amount of time inspectors and managers spend on 
administrative work. Additionally, FPS is designing RAMP so that it 
will produce risk assessments that are compliant with ISC standards, 
compatible with the risk management framework set forth by the NIPP, 
and consistent with the business processes outlined in the MOA with 
GSA. FPS expects that the first phase of RAMP will include BSA and 
countermeasure management tools, among other functions. According to 
FPS, RAMP will support all components of the BSA process, including 
gathering and reviewing building information; conducting and recording 
interviews; assessing threats, vulnerabilities, and consequences to 
develop a detailed risk profile; recommending appropriate 
countermeasures; and producing BSA reports.[Footnote 48] According to 
FPS, RAMP's countermeasure lifecycle management activities will include 
countermeasure design, review, recommendation, approval, 
implementation, acceptance, operation, testing, and replacement. 

FPS began designing RAMP in early 2007 and expects to implement the 
program in three phases, completing its implementation by the end of 
fiscal year 2011. However, it is unclear whether FPS will meet the 
implementation goals established in the program's proposed timeline. In 
June 2008, we reported that FPS was going to implement a pilot version 
of RAMP in fiscal year 2009,[Footnote 49] but in May 2009, FPS 
officials told us they intend to implement the first phase in the 
beginning of fiscal year 2010. FPS officials also told us that RAMP 
training for inspectors will begin in October 2009 and conclude in 
December 2009. Until RAMP components are fully implemented, FPS will 
continue to rely on its current risk assessment tool, methodology, and 
process, potentially leaving GSA and tenant agencies dissatisfied. GSA 
security officials are aware that RAMP's development and implementation 
have run behind schedule and are concerned about when improvements to 
FPS's risk assessment processes will be made. Under the 2006 MOA, FPS 
and GSA recognized that revisions and enhancements would need to be 
made to the risk assessment process, and FPS agreed it would work in 
consultation with GSA on any modifications to risk assessment tools. 
FPS shared RAMP plans with GSA in 2007 and solicited feedback, yet GSA 
security officials told us they think collaboration could have been 
stronger and have concerns about RAMP's ability to meet their physical 
security needs. For example, as stated earlier, GSA relies on FPS to 
provide it with risk assessments for buildings that it wants to lease, 
but because FPS does not provide these assessments in a timely manner 
GSA is taking steps to implement its own risk assessment tool by the 
end of fiscal year 2009. According to FPS, RAMP will include a risk 
assessment tool for new lease projects, but it did not include this 
component in the first development phase and instead, this tool is 
scheduled for rollout at the end of fiscal year 2010. FPS officials 
told us that as they move forward with RAMP, they intend to ask GSA and 
tenant agencies what risk assessment information they need from BSA 
reports. 

Also, FPS officials told us they are reassessing building security 
levels using ISC's updated facility security level standards[Footnote 
50] and a specialized calculator tool. The updated ISC standards take 
factors other than a building's size and population into account, 
including mission criticality, symbolism, threats to tenant agencies, 
and other factors such as proximity to a major transportation hub. 
[Footnote 51] FPS is trying to meet ISC's target date of September 30, 
2009, for finalizing updated building security levels for nearly 9,000 
GSA buildings. According to FPS, inspectors began reassessing building 
security levels during June 2008 and as of May 2009, FPS officials told 
us that inspectors had determined preliminary security levels for all 
buildings, and finalized security levels for 3,100 buildings. FPS 
officials told us inspectors have been following ISC guidance in 
reassessing the facility security levels which require that the tenant 
agencies make the final security level determination. However, GSA 
security officials at the national office told us they were receiving 
feedback from GSA security officials in the regions that some FPS 
inspectors were presenting the updated security levels as mandatory and 
final, not as preliminary results to be discussed. 

Risk management practices provide the foundation of a comprehensive 
protection program. Hence, efforts in the other key practice areas-- 
leveraging technology and information sharing and coordination--are 
diminished if they are not part of a risk management approach which can 
be the vehicle for using these tools. It is critical that FPS--which is 
responsible for assessing risk for nearly 9,000 GSA buildings and 
properties that GSA may lease--replace its outdated, subjective, and 
time-consuming risk assessment tool and approach with the new program 
it has been developing since fiscal year 2007, especially as the 
results of its risk analyses lay the foundation for FPS, GSA, and 
tenant agencies' security efforts. DHS is the nation's designated 
leader of critical infrastructure protection efforts; therefore, it is 
critical that RAMP be developed in an expeditious manner so that DHS 
can fulfill this mission with regard to federal facilities that FPS 
protects. Furthermore, department level attention in ensuring that FPS 
achieves success through regular updates to the Secretary is warranted. 
This added oversight would enhance the department's ability to monitor 
RAMP development and make FPS accountable for results, given the delays 
that RAMP has already experienced. 

FPS Lacks a Systematic Approach for Leveraging Technology, but Is 
Developing a Technology Acquisition Program: 

FPS's approach to leveraging technology does not ensure that the most 
cost-effective technologies are being selected to protect GSA 
buildings. Individual inspectors make technology decisions with limited 
training and guidance, giving GSA and tenant agencies little assurance 
that vulnerabilities have been systematically mitigated within and 
among all buildings as cost-effectively as possible. Although FPS is 
developing a program for technology acquisition, its implementation has 
been delayed and it does not include an evaluative component to ensure 
cost-effectiveness. 

Inspectors Have Considerable Latitude in Determining Which Technologies 
to Pursue, but Receive Little Training and Guidance: 

As previously discussed, FPS inspectors recommend security fixtures to 
GSA and security equipment to tenant agencies through the BSA process. 
However, the training, guidance, and standards that FPS provides to 
inspectors for selecting technologies are limited. As a result, GSA and 
tenant agencies have little assurance that the countermeasures 
inspectors recommend are cost-effective and the best available 
alternative. We have previously reported that by efficiently using cost-
effective technology to supplement and reinforce other security 
measures, agencies can more effectively apply the appropriate 
countermeasures to vulnerabilities identified through the risk 
management process, and that linking the chosen technology to 
countermeasures identified as part of the risk management process 
provides assurance that factors such as purpose, cost, and expected 
performance have been addressed.[Footnote 52] Furthermore, we have 
recognized that having a method that allows for cost-effectively 
leveraging technology to supplement and reinforce other measures 
represents an advanced application of the key practice.[Footnote 53] 

Through the BSA process, FPS recommends security fixtures to GSA, and 
GSA has policies and procedures in place to guide its decisions about 
the recommended investments and to identify and acquire cost-effective 
fixtures through established contracts with vendors.[Footnote 54] FPS 
inspectors also recommend technology-related security equipment through 
the BSA process and acquire, install, and maintain the security 
equipment that tenant agencies approve for purchase. FPS does not have 
a comprehensive approach for identifying, acquiring, and assessing the 
cost-effectiveness of the security equipment that its inspectors 
recommend. Instead, individual FPS inspectors identify equipment for 
its purchase, installation, and maintenance. FPS officials told us that 
inspectors make technology decisions based on the initial training they 
receive, personal knowledge and experience, and contacts with vendors. 
FPS inspectors receive some training in identifying and recommending 
security technologies as part of their initial FPS physical security 
training. Since FPS was transferred to DHS in 2003, its refresher 
training program for inspectors has primarily focused on law 
enforcement.[Footnote 55] Consequently, inspectors lack recurring 
technology training. Supervisory officers and inspectors from two of 
the five sites we visited told us that they learn about security 
technologies on their own by reviewing industry publications and by 
attending trade shows and security conferences but inspectors must have 
the time and funding to attend. A supervisory officer from one FPS 
region told us the region has sent some inspectors to security 
conferences sponsored by ASIS International.[Footnote 56] Additionally, 
FPS does not provide inspectors with specialized guidance and standards 
for cost-effectively selecting technology. In the absence of specific 
guidance, inspectors follow the DOJ minimum countermeasure standards 
and other relevant ISC standards[Footnote 57] but these standards do 
not assist users in selecting cost-effective technologies. 

FPS's devolution of responsibility for selecting technology to 
individual inspectors, whose knowledge of existing and emerging 
technologies varies because it is built on limited training and 
personal experience, results in subjective equipment selection 
decisions. Additionally, the acquisition process can be time-consuming 
for inspectors--many of whom have other law enforcement and security 
duties for multiple buildings--because they must search for equipment 
and vendors and facilitate the establishment of installation and 
maintenance contracts. FPS's process for acquiring, installing, and 
maintaining technologies provides GSA and tenant agencies with little 
assurance that they are getting the highest-quality, most cost- 
effective technology security solutions and that common vulnerabilities 
are being systematically mitigated across all buildings. For example, 
an explosives detection dog was used at one location to screen mail 
that is distributed elsewhere. In 2006, FPS had recommended, based on 
the results of its risk analysis, the use of this dog and an X-ray 
machine, although at the time of our visit only the dog was being used. 
Moreover, the dog and handler work 12-hour shifts Monday through Friday 
when most mail is delivered and shipped, and the dog needs a break 
every 7 minutes. The GSA regional security officials we spoke with 
questioned whether this approach was more effective and efficient than 
using an on-site enhanced X-ray machine that could detect biological 
and chemical agents as well as explosives and could be used anytime. In 
accordance with its policies, FPS conducted a BSA of the site in 2008 
and determined that using an enhanced X-ray machine and an explosives 
detection dog would bring the projected threat rating of the site down 
from moderate to low. FPS included estimated one-time installation and 
recurring costs in the BSA and executive summary, but did not include 
the estimated cost and risk of the following mail screening options: 
(1) usage of the dog and the additional countermeasure; (2) usage of 
the additional countermeasure only; and (3) usage of the dog only. 
Consequently, tenant agency representatives would have to investigate 
the cost and risk implications of these options on their own to make an 
informed resource allocation decision. 

FPS Is Developing a Program to Standardize Equipment and Contracting: 

FPS is taking steps to implement a more systematic approach to 
technology acquisition by developing a National Countermeasures 
Program, which could help FPS leverage technology more cost- 
effectively. According to FPS, the program will establish standards and 
national procurement contracts for security equipment, including X-ray 
machines, magnetometers, surveillance systems, and intrusion detection 
systems. FPS officials told us that instead of having inspectors search 
for vendors to establish equipment acquisition, installation, and 
maintenance contracts, inspectors will call an FPS mission support 
center with their countermeasure recommendations, and the center will 
procure the services through standardized contracts. According to FPS, 
the program will also include life-cycle management plans for 
countermeasures. FPS officials explained that the National 
Countermeasures Program establishes contractual relationships through 
GSA Schedule 84 to eliminate the need for individual contracting 
actions when requirements for new equipment or services are identified. 
[Footnote 58] FPS officials told us they worked closely with GSA's 
Federal Acquisition Service (FAS) to develop the program and FAS 
officials concurred stating, for example, that the two agencies have 
collaborated to ensure that GSA Schedule 84 has a sufficient number of 
vendors to support FPS requirements for physical security services. FPS 
officials said they established an X-ray machine contract through the 
schedule and that future program contracts will also explore the use of 
the schedule as a source for national purchase and service contracts. 
According to FPS, the National Countermeasures Program should provide 
the agency with a framework to better manage its security equipment 
inventory; meet its operational requirement to identify, implement, and 
maintain security equipment; and respond to stakeholders' needs by 
establishing nationwide resources, streamlining procurement procedures, 
and strengthening communications with its customers. FPS officials told 
us they believe this program will result in increased efficiencies 
because inspectors will not have to spend their time facilitating the 
establishment of contracts for security equipment because these 
contracts will be standardized nationwide. Additionally, FPS officials 
told us that they participate in the research and development of new 
technologies with DHS's Science and Technology Directorate.[Footnote 
59] 

Although the National Countermeasures Program includes improvements 
that may enhance FPS's ability to leverage technology, it does not 
establish tools for assessing the cost-effectiveness of competing 
technologies and countermeasures and implementation has been delayed. 
Security professionals are faced with a multitude of technology options 
offered by private vendors, including advanced intrusion detection 
systems, biotechnology options for screening people, and sophisticated 
video monitoring. Having tools and guidance to determine which 
technologies most cost-effectively address identified vulnerabilities 
is a central component of the leveraging technology key practice. FPS 
officials told us that the National Countermeasures Program will enable 
inspectors to develop countermeasure cost estimates that can be shared 
with GSA and tenant agencies. However, incorporating a tool for 
evaluating the cost-effectiveness of alternative technologies into 
FPS's planned improvements in the security acquisition area would 
represent an enhanced application of this key practice. Another concern 
is that FPS had planned to implement the program throughout fiscal year 
2009, but extended implementation into fiscal year 2010 and thus it is 
not clear whether FPS will meet the program's milestones in accordance 
with updated timelines. For example, FPS had anticipated that the X-ray 
machine and magnetometer contracts would be awarded by December 2008, 
and that contracts for surveillance and intrusion detection systems 
would be awarded during fiscal year 2009. In May 2009, FPS officials 
told us that the X-ray machine contract was awarded on April 30, 2009, 
and that they anticipated awarding the magnetometer contract in the 
fourth quarter of fiscal year 2009 and an electronic security services 
contract for surveillance and intrusion detection systems during the 
second quarter of fiscal year 2010. FPS had planned to test the program 
in one region before implementing it nationwide, but after further 
consideration, FPS management decided to forgo piloting the program in 
favor of rolling it out nationally. Until the National Countermeasures 
Program is fully implemented, FPS will continue to rely on individual 
inspectors to make technology decisions. It would be beneficial for FPS 
to establish a process for determining the cost-effectiveness of 
technologies considering the cost and risk implications for the tenant 
agencies that determine whether they will implement FPS's 
countermeasure recommendations. 

FPS's Information Sharing and Coordination Practices Lack Consistency: 

FPS, GSA, and tenant agencies share information and coordinate in a 
variety of ways at the national, regional, and building levels; 
however, FPS inspectors do not meet regularly with GSA property 
managers and tenant agencies, FPS and GSA disagree over what threat and 
risk information should be shared, and FPS faces technical obstacles to 
communicating directly with other law enforcement agencies when 
responding to incidents. 

Information Sharing and Coordination Practices Have Weaknesses: 

At the national level, FPS and GSA share information and coordinate in 
a variety of ways. We have reported that information sharing and 
coordination among organizations is crucial to producing comprehensive 
and practical approaches and solutions to address terrorist threats 
directed at federal buildings.[Footnote 60] FPS and the Building 
Security and Policy Division within GSA's PBS hold two biweekly 
teleconferences--one to discuss building security issues and priorities 
and the other to discuss the status of GSA contractor security 
background checks. FPS officials stated that this regular contact with 
GSA has made their relationship more productive and promotes 
coordination. GSA security officials also recognize the importance of 
these teleconferences, although they would like more involvement from 
FPS such as having better follow-through on meeting action items. 

Additionally, FPS and GSA are both members of ISC and serve together on 
various subcommittees and working groups. The FPS Director and the 
Director of the PBS Building Security and Policy Division participate 
in an ISC executive steering committee, which sets the committee's 
priorities and agendas for ISC's quarterly meetings. These activities 
could enhance FPS's and GSA's collaboration in implementing ISC's 
security standards and potentially lead to greater efficiencies. 
According to FPS and ISC, FPS has consistently participated in ISC 
working groups, but the staff assigned to some of the groups changed 
from meeting to meeting. GSA security officials also cited limitations 
with FPS's staffing of ISC working groups. 

FPS and GSA have also established an Executive Advisory Council to 
enhance the coordination and communication of security strategies, 
policies, guidance, and activities with tenant agencies in GSA 
buildings. As the council's primary coordinator, FPS convened the group 
for the first time in August 2008, and 17 agencies attended. According 
to FPS, it intends to hold semiannual council meetings, and as of May 
2009, FPS had not held a second formal meeting. This council could 
enhance communication and coordination between FPS and GSA, and provide 
a vehicle for FPS, GSA, and tenant agencies to work together to 
identify common problems and devise solutions. 

Furthermore, FPS and GSA are renegotiating the 2006 MOA between DHS and 
GSA to, among other things, improve communication. However, officials 
told us that this process has been time-consuming and the two parties 
have different views on the outcomes. FPS and GSA began renegotiating 
the MOA during fiscal year 2008 and expected to finalize it during 
fiscal year 2009. However, in May 2009, FPS officials told us they do 
not have an estimated date for finalizing the MOA and GSA officials 
told us they do not anticipate reaching an agreement until fiscal year 
2010. FPS and GSA recognize that the renegotiation can serve as an 
opportunity to discuss service concerns and develop mutual solutions. 
While FPS and GSA concur that the MOA should be used as an 
accountability tool, FPS thinks the document should offer general 
guidelines on the services it provides, but GSA wants a more 
prescriptive agreement. 

Overall, FPS and GSA regional officials told us that FPS shares some 
information with GSA and that collaboration between the two agencies 
has improved. However, the agencies' satisfaction with this situation 
differs. The FPS regional officials we spoke with said the agencies' 
information sharing and coordination procedures work well, while GSA 
regional security officials told us that communication should be more 
frequent and the quality of the information shared needs to be 
improved. Moreover, according to the GSA officials, FPS's sporadic and 
restricted sharing of threat information limits GSA's ability to 
protect its properties. We have reported that by having a process in 
place to obtain and share information on potential threats to federal 
buildings, agencies can better understand the risks they face and more 
effectively determine what preventive measures should be 
implemented.[Footnote 61] Additionally, we have reported that sharing 
terrorism-related information that is critical to homeland security 
protection is important, and agencies need to develop mechanisms that 
support this type of information sharing.[Footnote 62] The 2006 MOA 
between DHS and GSA requires FPS to provide GSA with quarterly 
briefings at the regional level. However, GSA regional security 
officials told us that they were not receiving related threat 
information as part of these updates until October 2008, when the FPS 
Director--in response to feedback from GSA--instructed regional 
personnel to share threat information. The FPS Director advised 
Regional Directors to meet quarterly with their respective GSA regional 
administrators, regional commissioners, or security representatives to 
discuss and share information on regional security issues. The Director 
further stated that briefings should include unclassified intelligence 
information concerning threats against GSA buildings and updates to the 
regional threat assessment, as well as information and analysis on 
protecting the regions' most vulnerable facilities. Moreover, in its 
strategic plan,[Footnote 63] FPS recognizes the importance of ensuring 
that policies and procedures are being established and followed 
consistently across the country, and asserts that effective 
communication between headquarters and regional personnel at all levels 
will aid in this effort. GSA officials also told us that they are 
taking steps to replicate headquarters structures in their regions to 
ensure consistent applications of policies and to standardize 
communication practices. 

While FPS's action to share threat information is a positive step, GSA 
security officials at the national office told us they received 
feedback from security staff in the regions that threat briefings were 
not uniform across regions and varied in their usefulness. The majority 
of the briefings, the officials said, communicated information about 
crime incidents and did not, in their view, provide threat information. 
In May 2009, FPS officials told us that regions gave briefings during 
the second quarter of fiscal year 2009, but GSA security officials told 
us that some regions reported that they had not received these second 
quarter briefings. To improve information sharing and coordination at 
the regional level, FPS standardized its quarterly threat briefing 
format. FPS officials told us that they partnered with GSA to create a 
sensitive but unclassified (SBU) facility-specific companion document 
to the BSA called the "Facility Security Assessment Threat Summary." 
According to FPS, this quarterly threat briefing will contain facility- 
specific information on security performance measures, criminal 
activity, unclassified intelligence regarding threats, significant 
events, special FPS law enforcement operations, and potential threats, 
demonstrations, and other events. FPS officials told us that this 
quarterly threat briefing format is a positive step in providing a 
briefing document that GSA can use in evaluating threat information 
that is germane to its property portfolio. FPS officials told us that 
they finalized the briefing format and that the Director signed the 
General Services Administration Threat Briefing Policy directive in 
June 2009. In contrast, in June 2009, GSA security officials told us 
that they believe they had little involvement in developing FPS's 
threat briefing format explaining that although FPS asked GSA to 
comment on its proposed format--which, according to GSA, it did in 
March 2009--FPS had not discussed GSA's comments with them or updated 
GSA on the content or status of the format. GSA security officials told 
us they have representation on an ISC working group that is developing 
a standardized design basis threat template to support risk assessment 
threat ratings. 

According to the 2006 MOA, FPS is to meet with GSA property managers 
and tenant agency representatives when it discusses the results of its 
BSAs. Depending on the building's security level, the BSA may occur 
every 2 to 4 years.[Footnote 64] Apart from these briefings, FPS, GSA, 
and tenant agencies choose how frequently they will all meet. An 
information sharing best practice that we have reported on is holding 
regularly scheduled meetings during which participants can, for 
example, share security management practices, discuss emerging 
technologies, and create committees to perform specific tasks, such as 
policy setting.[Footnote 65] It is critical that FPS, as the provider 
of law enforcement and related security services for GSA buildings, and 
GSA, as the manager of these properties, have well-established lines of 
communication with each other and with tenant agencies to ensure that 
all parties are aware of the ever-changing risks in a dynamic threat 
environment and that FPS and GSA are taking appropriate actions to 
reduce vulnerabilities. Nevertheless, we identified information sharing 
gaps at all the sites we visited, and found that in some cases these 
deficiencies led to decreased security awareness and increased risk. 

* At one location, we observed during our interview with the building 
security committee (BSC) that the committee members were confused about 
procedures for screening visitors who are passengers in employees' cars 
that enter the building via the parking garage. One of the tenants 
recounted an incident in which a security guard directed the visitor to 
walk through the garage to an appropriate screening station. According 
to the GSA property manager, this action created a safety hazard. The 
GSA property manager knew the appropriate screening procedure, but told 
us there was no written policy on the procedure that members could 
access. Additionally, BSC members told us that the committee met as 
needed. 

* At one location, FPS had received inaccurate square footage data from 
GSA and had therefore overcharged the primary tenant agency for a guard 
post that protected space shared by all the tenants. According to the 
GSA property manager, once GSA was made aware of the problem, the 
agency obtained updated information and worked with the tenant agencies 
to develop a cost-sharing plan for the guard post, which made the 
primary tenant agency's security expenses somewhat more equitable. BSC 
members told us that the committee met regularly. 

* At one location, members of a BSC told us that they met as needed, 
although even when they hold meetings, one of the main tenant agencies 
typically does not participate. GSA officials commented that this 
tenant adheres to its agency's building security protocols and does not 
necessarily follow GSA's tenant policies and procedures which GSA 
thinks creates security risks for the entire building. 

* At one location, tenant agency representatives and officials from FPS 
told us they met regularly, but GSA officials told us they were not 
invited to these meetings. GSA officials at this location told us that 
they invite FPS to their property management meetings for that 
location, but FPS does not attend. GSA officials also said they do not 
receive timely incident information for the site from FPS and suggested 
that increased communication among the agencies would help them be more 
effective managers of their properties and provide tenants with better 
customer service. 

* At one location, GSA undertook a major renovation project beginning 
in April 2007. FPS, GSA, and tenant agency representatives did not all 
meet together regularly to make security preparations or manage 
security operations during construction. FPS officials told us they had 
not been invited to project meetings, although GSA officials told us 
that they had invited FPS and that FPS attended some meetings. In May 
2008, FPS discovered that specific surveillance equipment had been 
removed. As of May 2009, FPS officials told us they did not know who 
had removed the equipment and were working with tenant agency 
representatives to recover it. However in June 2009, tenant agency 
representatives told us that they believed FPS was fully aware that the 
equipment had been removed in December 2007.[Footnote 66] 

To improve information sharing and coordination at the building level, 
FPS and GSA plan to implement ISC's facility security committee 
standards at all multi-tenant and single-tenant buildings and campuses 
after ISC issues them. FPS and GSA could leverage these standards to 
establish consistent communications and designate the roles and 
responsibilities of FPS, GSA, and tenant agencies. FPS and GSA have had 
representation on the ISC working group that is developing the 
standards. ISC intends to issue the standards in the first quarter of 
fiscal year 2010, but it is unclear when FPS and GSA will implement 
them. 

GSA security officials also told us that FPS does not consistently or 
comprehensively inform GSA of changes to services or provide GSA with 
contingency plans when FPS deploys inspectors and other personnel to 
provide law enforcement, security, and emergency response services for 
special events in support of broader homeland security goals. For 
example, GSA security officials cited some instances in which FPS 
reduced its services during the 2009 Presidential Inauguration. They 
noted, for example, that FPS inspectors did not attend BSC meetings and 
said that FPS did not inform GSA of all service changes. FPS's response 
to special events and critical incidents is governed by the FPS Interim 
Critical Incident Response Plan issued by the Director in September 
2007.[Footnote 67] This plan does not include procedures for notifying 
GSA and tenant agencies of expected service changes, restrictions, and 
modifications at the national, regional, and building levels. FPS 
officials told us that FPS notified tenant agencies in the National 
Capital Region of expected service changes, restrictions, and 
modifications during the 2009 inauguration. Officials also said that, 
when possible, inspectors personally contacted GSA building managers 
and tenant agency representatives in the region. However, FPS personnel 
were deployed from all regions in accordance with the critical incident 
response plan and FPS officials did not tell us that regions other than 
the National Capital Region were notified. Because GSA and tenant 
agencies rely on FPS to provide critical law enforcement and security 
services and tenant agencies pay for these services, we believe it is 
important for FPS to notify these entities in advance of service 
changes and provide for interim coverage. 

FPS and GSA Disagree Over Sharing Information from the BSA: 

While FPS and GSA acknowledge that the two organizations are partners 
in protecting and securing GSA buildings, FPS and GSA fundamentally 
disagree over how much of the information in the BSA should be shared. 
Per the MOA, FPS is required to share the BSA executive summary with 
GSA and FPS believes that this document contains sufficient information 
for GSA to make decisions about purchasing and implementing FPS's 
recommended countermeasures. However, GSA officials at all levels cited 
limitations with the BSA executive summary saying, for example, that it 
does not contain enough contextual information on threats and 
vulnerabilities to support FPS's countermeasure recommendations and to 
justify the expenses that GSA and tenant agencies would incur by 
installing additional countermeasures. Moreover, GSA security officials 
told us that FPS does not consistently share BSA executive summaries 
across all regions. Instead, GSA wants to receive BSAs in their 
entirety so that it can better protect its buildings and the tenants 
who occupy them. The BSA executive summary includes: 

* a brief description of the building; 

* an overview of the risk assessment methodology; 

* types of threats that the building is exposed to and their risk 
ratings; 

* countermeasure recommendations, estimated installation and recurring 
costs; and: 

* projected threat ratings after countermeasure implementation. 

In contrast, a complete BSA includes: 

* a detailed description of the physical features of the building and 
its tenants; 

* a list of interviewees and contact information; 

* a profile of occupants and agency missions; 

* recent losses, crimes, and security violations; 

* previous security surveys, inspections, and related audits, 
investigations, and studies; 

* descriptions of adequate and inadequate existing countermeasures; 

* descriptions of threats and risk ratings; 

* descriptions of countermeasure recommendations, and estimated 
installation and recurring costs; and: 

* projected threat ratings after countermeasure implementation. 

When FPS was housed within GSA and PBS, GSA security officials told us 
that FPS shared BSAs in their entirety with GSA, but now at the 
national level, GSA can request full BSAs from FPS, and FPS makes 
determinations on a case-by-case basis by following and interpreting 
DHS information sharing policies. However, GSA security officials told 
us that the process for requesting BSAs is informal and that FPS has 
not been responsive to these requests overall. Furthermore, considering 
there are nearly 9,000 buildings in GSA's inventory, this may be an 
inefficient approach to obtain key facility protection information. We 
have found that information sharing and coordination are important at 
the individual building level and that protecting federal buildings 
requires building security managers to involve multiple organizations 
to effectively coordinate and share information to prevent, detect, and 
respond to terrorist attacks.[Footnote 68] 

According to GSA, building protection functions are an integral part of 
its property preservation, operation, and management responsibilities. 
In 2000, when FPS was still a part of GSA, Congress considered removing 
FPS from PBS. At that time, GSA opposed such action asserting that it 
would divorce security from other federal building functions when 
security considerations needed to be integrated into decisions about 
the location, design, and operation of federal buildings. GSA was 
concerned that separating FPS from PBS would create an organizational 
barrier between protection experts and PBS asset managers, planners, 
project managers, and building managers who set PBS budgets and 
policies for the GSA inventory as a whole and oversaw day-to-day 
operations in GSA buildings. However, Congress did not remove FPS from 
PBS, and FPS remained within GSA and PBS until it was transferred to 
DHS and ICE under the Homeland Security Act of 2002. Prior to the 
creation of DHS, we expressed concern about separating security from 
other real property portfolio functions, such as site location, design, 
and construction for new federal buildings, because decisions on these 
factors have implications for what types of security will be necessary 
and effective.[Footnote 69] We concluded that if DHS was given the 
responsibility for securing GSA facilities, the role of integrating 
security with other real property functions would be an important 
consideration, especially since GSA would still be the caretaker of 
these buildings. 

Under the Homeland Security Act of 2002, FPS was transferred to DHS and 
retained responsibilities for law enforcement and related security 
functions for GSA buildings and grounds. However, except for law 
enforcement and related security functions transferred to DHS, under 
the act, GSA retained all powers, functions, and authorities in law, 
related to the operation, maintenance, and protection of its buildings 
and grounds.[Footnote 70] As a result of the act, GSA and DHS both have 
protection responsibilities for GSA-controlled buildings and grounds. 
DHS and GSA developed an MOA to address roles, responsibilities, and 
operational relationships between FPS and GSA concerning the security 
of GSA-controlled space. Through this agreement, DHS and GSA determined 
that FPS would continue to conduct BSAs for GSA. GSA security officials 
told us that GSA staff at the national, regional, and building levels 
need the information contained in the BSA to cost-effectively manage 
their buildings to ensure that they are secure and that their 
customers, or tenant agencies, are adequately protected. Because GSA 
personnel do not receive the entire BSA, they must decide on the basis 
of incomplete information how to use funds to implement countermeasures 
and mitigate vulnerabilities. Furthermore, GSA property managers are 
responsible for coordinating and maintaining emergency management 
plans, such as evacuation and continuity of operations plans, and when 
a safety or security incident arises at a GSA building, GSA assumes a 
lead role in the incident command. Without complete risk information, 
GSA is challenged to maintain appropriate situational awareness and 
preparedness to protect buildings, especially during emergencies. 

Although the Director of FPS recognizes that FPS and GSA have common 
interests in protecting GSA buildings and the federal employees who 
work in them, the Director has determined that GSA does not meet the 
standards under which FPS shares BSAs and maintains that BSA executive 
summaries provide GSA with sufficient information. FPS designates the 
SBU information contained in BSAs as "law enforcement sensitive" 
(LES)[Footnote 71] in accordance with DHS and ICE policies. FPS 
considers the BSA to be an LES document because it incorporates all 
aspects of a location's physical security into one document whose 
release outside of the law enforcement arena could adversely impact the 
conduct of law enforcement programs. According to FPS, the BSA can 
include LES information such as: 

* information, details, or criminal intelligence data indicating why a 
threat is deemed credible; 

* information and details relating to any ongoing criminal 
investigations, law enforcement operations, or both; and: 

* detailed analysis of why the lack or inadequacy of a countermeasure 
creates an exploitable vulnerability. 

According to FPS, LES information is safeguarded and determinations to 
disseminate LES information are made in accordance with a DHS 
information safeguarding management directive[Footnote 72] and an ICE 
directive for safeguarding LES information.[Footnote 73] FPS maintains 
that GSA does not need to know the LES information that is contained in 
the BSA and that if the BSA is released to GSA, the risk of 
unscrupulous or criminal use of the information would increase 
significantly. According to FPS, the information contained in the BSA 
is not critical to GSA's performance of its authorized, assigned 
mission. FPS further maintains that GSA retains no legal responsibility 
for the physical protection and law enforcement operations within GSA 
buildings because the Homeland Security Act of 2002 transferred FPS's 
law enforcement and related security functions from GSA to DHS and that 
under the act it is responsible for protecting the buildings, grounds, 
and property under GSA's control or custody. 

We have reported on the importance of sharing terrorism-related 
information that is critical to homeland security protection and have 
identified a need for agencies to develop mechanisms that support this 
information sharing.[Footnote 74] Other federal agencies have found 
ways to share sensitive information with other entities. For example, 
in response to a GAO recommendation,[Footnote 75] the Transportation 
Security Administration established regulations that allow for sharing 
sensitive security information with persons covered by the regulations 
who have a need to know, including airport and aircraft operators, 
foreign vessel owners, and Transportation Security Administration 
employees.[Footnote 76] The ICE directive for safeguarding LES 
information states that an information sharing and access agreement in 
the form of a memorandum of understanding or agreement may formalize 
LES information exchanges between DHS and an external entity. Moreover, 
according to standard language in FPS's BSAs, a security clearance is 
not required for access to LES information; a criminal history check 
and a national fingerprint check--performed in accordance with Homeland 
Security Presidential Directive 12 (HSPD-12)[Footnote 77] investigative 
requirements--is required. According to GSA, it follows these 
requirements. Moreover, GSA has an information safeguarding policy in 
place to protect SBU building information which can include: 

* the location and details of secure functions or space in a building 
such as secure routes for prisoners and judges inside courthouses; 

* the location and details of secure functions or secure space such as 
security and fire alarm systems; 

* the location and type of structural framing for the building 
including any information regarding structural analysis, such as 
counterterrorism methods used to protect the building and occupants; 
and: 

* risk assessments and information regarding security systems or 
strategies of any kind.[Footnote 78] 

In the 2006 MOA, FPS and GSA agreed that shared SBU information would 
be handled in accordance with each agency's information safeguarding 
policies. Furthermore, one of FPS's strategic goals is to foster 
relationships to increase the proactive sharing of information and 
intelligence. In its strategic plan, FPS states that it will use 
efficient information sharing and information protection processes 
based on mutually beneficial, trusted relationships to ensure the 
implementation of effective, coordinated, and integrated infrastructure 
protection programs and activities.[Footnote 79] 

When we spoke with FPS and GSA officials in 2008, they thought the MOA 
renegotiation could serve as a platform for determining what BSA 
information should be shared. However, when we spoke with FPS and GSA 
officials in 2009, they did not know when the MOA would be renegotiated 
and FPS determined it would not change BSA sharing procedures during 
the renegotiation. Therefore, GSA will continue to receive BSA 
executive summaries and the individual BSAs that FPS approves for 
sharing, but it will not have access to other BSA information that it 
could use to make risk-based decisions to protect its buildings, the 
federal employees who work in them, and visitors to these buildings. 

In a post-September 11 era, it is crucial that federal agencies work 
together to share information to advance homeland security and critical 
infrastructure protection efforts. Information is a crucial tool in 
fighting terrorism, and the timely dissemination of that information to 
the appropriate government agency is absolutely critical to maintaining 
the security of our nation. The ability to share security-related 
information can unify the efforts of federal agencies in preventing or 
minimizing terrorist attacks. However, in the absence of comprehensive 
information-sharing plans, many aspects of homeland security 
information sharing can be ineffective and fragmented. In 2005, we 
designated information sharing for homeland security as a 
governmentwide high-risk area because of the significant challenges 
faced in this area[Footnote 80]--challenges that are still evident 
today. It is critical that FPS and GSA--which both have protection 
functions for GSA buildings, their occupants, and those who visit them-
-reach consensus on sharing information in a timely manner to support 
homeland security and critical infrastructure protection efforts. GSA 
raises strong arguments for having this information and FPS could do 
more to resolve this situation. 

FPS's and Other Law Enforcement Organizations' Communication Systems 
Lack Interoperability: 

FPS provides the law enforcement response for incidents at GSA 
buildings, during which it may need to communicate with other first 
responders. Additionally, DHS can call upon FPS to provide law 
enforcement and security services at natural disasters or special 
events such as political demonstrations, and FPS must then communicate 
with other federal, state, and local first responders. For these 
situations, having an interoperable communication system is desirable. 
However, first responders continue to use various, and at times 
incompatible, communications technologies, making it difficult to 
communicate with neighboring jurisdictions or other first responders to 
carry out the response. We noted during our review that FPS radios lack 
interoperability, meaning they are unable to communicate with the 
equipment used by other law enforcement agencies--federal, state, and 
local. Delayed communications with area first responders during 
emergencies could curtail the timeliness and effectiveness of FPS's law 
enforcement services. 

* FPS officials at one location told us that only new FPS vehicles have 
had radio upgrades, some FPS personnel have new hand-held radios, and 
other handheld radios have not been changed in 6 years. Changes in 
radio technology can inhibit interoperability among first responders 
who upgrade equipment as possible. 

* FPS officials at one location told us that FPS can use the same radio 
frequency as the local police department, but the two organizations' 
radio systems are not fully interoperable because the police use a 
digital system and FPS does not. Therefore, communication between these 
entities can be limited. 

* FPS officials at one location told us that federal and local law 
enforcement agencies communicate with FPS via telephone or through the 
area FPS MegaCenter,[Footnote 81] instead of directly through radios, 
because the organizations' radio systems are not interoperable. 
Therefore, communication among these entities can be limited. 

* FPS officials at one location told us that FPS's handheld radios are 
not interoperable with those of area federal and local law enforcement 
personnel, because FPS does not use the same radio band spectrum other 
federal law enforcement agencies use and instead uses its own ultra- 
high-frequency band. As a result, communication among these entities is 
limited. 

* FPS officials at one location told us that their radios are not 
interoperable with those of the local police department. Therefore, 
communication between the two entities can be limited. FPS is exploring 
whether it can connect to the police department through a local 
interagency communications system. 

FPS is developing a National Radio Program that includes a component 
intended to make FPS's radios interoperable with those of other 
federal, state, and local law enforcement organizations. FPS began 
planning this initiative in 2008, was working to fill the program 
manager position by the end of June 2009, and expects to achieve full 
implementation by 2013. According to FPS officials, they have 
established a branch under the FPS MegaCenter program specifically 
dedicated to enhancing and supporting the National Radio Program. 
Consistent with establishing this new branch, FPS officials said they 
are working to fill contract positions in each region for radio 
technicians to support the technical requirements associated with 
mobile radios, portable radios, programming, and the radio network 
infrastructure. According to FPS, they are working to contract for a 
survey and design team to coordinate with FPS's regional offices, the 
National Radio Program, and the MegaCenter program to standardize and 
enhance the national radio infrastructure. 

According to FPS officials, the enhancements to FPS's communications 
will provide solutions for newer technologies and will meet national 
communications standards and DHS standards for advanced encryption. FPS 
officials said they are beginning an internal evaluation of FPS's 
existing communications capabilities, which should allow future 
enhancement efforts to be prioritized as part of an overall effort to 
enhance national radio coverage. FPS officials said they are working to 
procure, program, and issue more than 2,900 new radios that conform to 
new equipment standards and will eventually phase out older equipment 
used by FPS officers and guards. FPS officials said that all future 
radios issued will conform to updated standards to promote uniformity 
and enhanced support capabilities. While FPS officials think 
interoperability will be improved under this initiative, they cautioned 
that their law enforcement counterparts' communication equipment must 
meet DHS's advanced encryption standard which can be a challenge for 
state and local partners. 

Conclusions: 

FPS has a number of improvements planned or in development that, if 
fully incorporative of the key practices, will provide greater 
assurance that FPS is effectively protecting GSA buildings and 
maximizing security investment dollars. The key practices we examined 
vis-à-vis FPS--allocating resources using risk management, leveraging 
technology, and information sharing and coordination--are critical 
components to an effective and efficient physical security program. 
However, FPS's application of these practices had limitations and as a 
result, there is a lack of assurance that federal buildings under the 
control and custody of GSA, the employees who work in them, and 
visitors to them are being adequately protected. Related to allocating 
resources using risk management, FPS's assessment of risks at buildings 
is a critical responsibility considering the results lay the foundation 
by which GSA and tenants make resource allocation decisions. However, 
FPS's current risk assessment process is inadequate and its efforts to 
improve it through the development of RAMP have been delayed. Related 
to leveraging technology, planned improvements to the way inspectors 
acquire security equipment through the National Countermeasures Program 
have also experienced delays and knowing the cost implications of 
different alternatives is the foundation of this key practice, although 
FPS is not directly addressing this critical element. Continued delays 
in the implementation of improvements in these critical areas--risk 
management and leveraging technology--are of concern and deserving of 
greater attention by DHS management. Furthermore, related to 
information sharing and coordination, FPS's communications with GSA and 
tenants could benefit from more clearly defined parameters for 
consistency, frequency, and content, and issues related to 
interoperability with other law enforcement agencies surfaced as a 
concern that FPS is trying to address. Without a greater focus on the 
key practices, FPS will be ill-equipped to sufficiently manage security 
at GSA buildings, and assist with broader homeland security efforts as 
the security landscape changes and new threats emerge. 

Recommendations for Executive Action: 

We are making three recommendations to the Secretary of Homeland 
Security aimed at moving FPS toward greater use of the key practices we 
assessed. Specifically, we recommend that the Secretary instruct the 
Director of FPS, in consultation, where appropriate, with other parts 
of DHS, GSA, and tenant agencies to take the following three actions: 

1. Provide the Secretary with regular updates, on a mutually agreed-to 
schedule, on the status of RAMP and the National Countermeasures 
Program, including the implementation status of deliverables, clear 
timelines for completion of tasks and milestones, and plans for 
addressing any implementation obstacles. 

2. In conjunction with the National Countermeasures Program, develop a 
methodology and guidance for assessing and comparing the cost- 
effectiveness of technology alternatives. 

3. Reach consensus with GSA on what information contained in the BSA is 
needed for GSA to fulfill its responsibilities related to the 
protection of federal buildings and occupants, and accordingly, 
establish internal controls to ensure that shared information is 
adequately safeguarded; guidance for employees to use in deciding what 
information to protect with SBU designations; provisions for training 
on making designations, controlling, and sharing such information with 
GSA and other entities; and a review process to evaluate how well this 
information sharing process is working, with results reported to the 
Secretary regularly on a mutually agreed-to schedule. 

Agency Comments and Our Evaluation: 

We provided a draft of the sensitive but unclassified report to DHS and 
GSA for review and comment. DHS agreed with our assessment that greater 
attention to key practices would improve FPS's approach to facility 
protection and agreed with the report's recommendations. Furthermore, 
DHS stated that FPS will continue to work with key stakeholders to 
address other security issues that were cited in our report, for which 
specific recommendations were not made. With respect to the first 
recommendation--to provide the Secretary of Homeland Security with 
regular updates on the status of RAMP and the National Countermeasures 
Program--DHS stated that FPS will submit a consolidated monthly report 
to the Secretary. 

Although DHS agreed with our second and third recommendations, we are 
concerned that the steps it described are not comprehensive enough to 
address the intent of the recommendations. For the second 
recommendation--to develop a methodology and guidance for assessing and 
comparing the cost-effectiveness of technology alternatives--DHS 
commented that such efforts will be a part of FPS's development of RAMP 
and that future phases of RAMP will include the ability to evaluate 
countermeasure alternatives based on cost and the ability to mitigate 
identified risks. However, RAMP has experienced delays and it is 
unclear when this future component of RAMP will be developed and 
implemented. Moreover, as we reported, FPS inspectors have considerable 
latitude in determining which technologies and other countermeasures to 
recommend, but receive little guidance to help them assess the cost- 
effectiveness of these technologies. Until the cost-analysis component 
of RAMP is implemented, it will be important for inspectors to have 
guidance they can use to make cost-effective countermeasure 
recommendations so that GSA and tenant agencies can be assured that 
their investments in FPS-recommended technologies and other 
countermeasures are cost-effective, consistent across buildings, and 
the best available alternatives. 

Regarding the third recommendation--to reach consensus with GSA on what 
information contained in the BSA is needed for GSA to fulfill its 
protection responsibilities and to establish information sharing and 
safeguarding procedures--DHS responded that FPS is developing a 
facility security assessment template as a part of RAMP to produce 
reports that can be shared with GSA and other agencies. However, DHS 
did not explicitly commit to reaching consensus with GSA in identifying 
building security information that can be shared, or to the steps we 
outlined in our recommendation--steps that in our view comprise a 
comprehensive plan for sharing and safeguarding sensitive information. 
As we reported, FPS and GSA fundamentally disagree over what BSA 
information should be shared and FPS has decided not to discuss this 
matter with GSA as part of the MOA renegotiation. Furthermore, RAMP 
continues to experience delays and it is unclear when it will produce 
facility security assessments than can be shared with GSA. Therefore, 
it is important that FPS engage GSA in identifying what building 
security information can be shared and follow the information sharing 
and safeguarding steps we included in our recommendation to ensure that 
GSA acquires the information it needs to protect the 9,000 buildings 
under its control and custody, the federal employees who work in them, 
and those who visit them. 

GSA agreed with our findings concerning the challenges that FPS faces 
in delivering security services for GSA buildings. GSA indicated that 
it will continue to work closely with FPS to ensure the protection of 
GSA buildings, their tenants, and visitors to these buildings. GSA 
stated that it will work with FPS to address our recommendation that 
the two agencies reach a consensus on the sharing and safeguarding of 
information contained in BSAs. DHS also provided technical comments, 
which we incorporated where appropriate. DHS's comments can be found in 
appendix II and GSA's comments can be found in appendix III. 

As agreed with your office, unless you publicly announce the contents 
of this report earlier, we plan no further distribution until 30 days 
from the report date. At that time, we will send copies of this report 
to the Secretary of Homeland Security, the Acting Administrator of 
General Services, appropriate congressional committees, and other 
interested parties. In addition, the report will be available at no 
charge on GAO's Web site at [hyperlink, http://www.gao.gov]. 

If you have any questions about this report, please contact me at (202) 
512-2834 or goldsteinm@gao.gov. Contact points for our Offices of 
Congressional Relations and Public Affairs may be found on the last 
page of this report. GAO staff who made major contributions to this 
report are listed in appendix IV. 

Sincerely yours, 

Signed by: 

Mark L. Goldstein: 
Director, Physical Infrastructure Issues: 

[End of section] 

Appendix I: Objectives, Scope, and Methodology: 

The objective of this report was to determine whether the Federal 
Protective Service's (FPS) approach to security for buildings under the 
control and custody of the General Services Administration (GSA) 
reflects key facility protection practices. Through previous work, we 
identified a set of key practices from the collective practices of 
federal agencies and private sector entities that can provide a 
framework for guiding agencies' protection efforts and addressing 
challenges.[Footnote 82] These key practices form the foundation of a 
comprehensive approach to building protection. We used our key facility 
protection practices as criteria to evaluate the steps that FPS has 
taken. We used the following key practices as criteria: allocating 
resources using risk management; leveraging technology; and information 
sharing and coordination. For the purposes of this review, we did not 
consider three other key practices for varying reasons: performance 
measurement and testing, because we reported on the limitations FPS 
faces in assessing its performance in 2008; aligning assets to mission, 
because GSA, not FPS, controls the asset inventory; and strategic 
management of human capital, because we are currently reviewing FPS's 
management of human capital. 

To examine FPS's application of key practices at the building level, we 
selected five sites, basing our selection on factors that included 
geographical diversity, high occupancy, the building's designated 
security level, other potential security considerations such as new or 
planned building construction, and recent and ongoing work. Selected 
sites included three multi-tenant level IV buildings,[Footnote 83] one 
single-tenant level IV campus, and one single-tenant level III campus. 
[Footnote 84] 

Collectively, the sites we selected illustrate the range of building 
protection practices applied by FPS. At each site, we interviewed FPS, 
GSA, and tenant agency officials with primary responsibility for 
security implementation, operation, and management. We toured each site 
and observed the physical environment, the buildings, and the principal 
security elements to gain firsthand knowledge of the building 
protection practices. We collected documents, when available, that 
contained site-specific information on security risks, threats, 
budgets, and staffing for analysis. Because we observed FPS's efforts 
to protect GSA buildings at a limited number of sites, our observations 
cannot be generalized to all the buildings that FPS is responsible for 
securing. To supplement these site visits, we interviewed FPS and GSA 
security officials from the four regions where we had visited 
buildings--regions 2, 4, 7, and 11. We also interviewed FPS and GSA 
security officials at the national level and collected supporting 
documentation on security plans, policies, procedures, budgets, and 
staffing for analysis. For example, we reviewed the 2006 Memorandum of 
Agreement between the Department of Homeland Security (DHS) and GSA 
that sets forth the security responsibilities of FPS and GSA at federal 
buildings. We also interviewed the executive director of the 
Interagency Security Committee (ISC), and we analyzed ISC's Facility 
Security Level Determinations for Federal Facilities, Security Design 
Criteria for new Federal Office Buildings and Major Modernization 
Projects, and Security Standards for Leased Space. We also analyzed the 
facility security level standards and minimum security requirements set 
forth by the Department of Justice's (DOJ) DOJ Vulnerability Assessment 
of Federal Facilities.[Footnote 85] We analyzed FPS planning documents, 
including FPS's 2008-2011 Strategic Plan and the Risk Assessment and 
Management Program Concept of Operations. We analyzed laws that 
described FPS and GSA's protection authorities including the Homeland 
Security Act of 2002, and Title 40 of the United States Code. We also 
analyzed laws and internal documents that govern FPS's information 
safeguarding practices including DHS Management Directive 11042.1, 
Safeguarding Sensitive But Unclassified Information and ICE Directive 
73003.1, Safeguarding Law Enforcement Sensitive Information. 

We conducted this performance audit from January 2008 to September 2009 
in accordance with generally accepted government auditing standards. 
Those standards require that we plan and perform the audit to obtain 
sufficient, appropriate evidence to provide a reasonable basis for our 
findings and conclusions based on our audit objectives. We believe that 
the evidence obtained provides a reasonable basis for our findings and 
conclusions based on our audit objective. 

[End of section] 

Appendix II: Comments from the Department of Homeland Security: 

US. Department of Homeland Security: 
Washington, DC 20528: 

October 16, 2009: 

Mr. Mark L. Goldstein: 
Director: 
Physical Infrastructure Issues: 
U.S. Government Accountability Office: 
441 G Street, NW: 
Washington, DC 20548: 

Dear Mr. Goldstein: 

Re: Draft Report GAO-10-142, Homeland Security: Greater Attention to 
Key Practices Would Improve the Federal Protective Service's Approach 
to Facility Protection (GAO Job Code 543249/543230): 

The Department of Homeland Security (Department) appreciates the 
opportunity to review and comment on the U.S. Government Accountability 
Office's (GAO's) draft report referenced above. The Department, 
particularly U.S. Immigration and Customs Enforcement under which the 
Federal Protective Service (FPS) currently is located, agrees with the 
recommendations. 

GAO makes three recommendations to the Secretary aimed at moving FPS 
toward greater use of assessed key practices, specifically recommending 
that the Director of FPS take the following actions: 

Recommendation l: Provide the Secretary with regular updates, on a 
mutually agreed-to schedule, on the status of the Risk Assessment and 
Management Program (RAMP) and the National Countermeasures Program, 
including the implementation status of deliverables, clear timelines 
for completion of tasks and milestones, and plans for addressing any 
implementation obstacles. 

Response: The Director of the FPS will submit a consolidated monthly 
report to the Secretary via the ICE Assistant Secretary. FPS will also 
continue to coordinate the methodological aspects of RAMP with the 
Office of Risk Management and Analysis in the National Protection and 
Programs Directorate, Finally, it should be noted that FPS has briefed 
RAMP to the National Academy of Sciences panel that is currently 
examining the use of risk assessments throughout the Department. 

Recommendation 2: In conjunction with the National Countermeasures 
Program, develop a methodology and guidance for assessing and comparing 
the cost-effectiveness of technology alternatives. 

Response: Through the development of RAMP and the National 
Countermeasures Program, FPS is incorporating information on the 
various countermeasure systems, types, and elements that can be 
employed to mitigate risk for Federal facilities. This includes 
estimated cost information. Future phases of RAMP will include the 
ability to specifically evaluate countermeasure alternatives based on 
cost and their ability to mitigate identified risks for federal 
facilities. Also, the information included in RAMP for recommended and 
implemented countermeasures will provide FPS with a comprehensive 
system to assess the estimated and actual costs to install, operate, 
maintain, test, and replace the countermeasures it utilizes This will 
serve to continually improve and update the financial information used 
for cost-benefit analyses. 

Recommendation 3: Reach consensus with the General Services 
Administration (GSA) on what information contained in the building 
security assessments (BSA) is needed for GSA to fulfill its 
responsibilities related to the protection of federal buildings and 
occupants, and accordingly, establish internal controls to ensure that 
shared information is adequately safeguarded; guidance for employees to 
use in deciding what information to protect with Sensitive But 
Unclassified (SBU) designations; provisions for training on making 
designations, controlling, and sharing such information with GSA and 
other entities; and a review process to evaluate how well this 
information sharing process is working, with results reported to the 
Secretary regularly on a mutually agreed-to schedule. 

Response: In developing the Facility Security Assessment (previously 
referred to as the BSA) template that will be used by RAMP, FPS has 
given specific attention to the breadth of information that is required 
for GSA and tenant agencies to understand the risks faced by their 
facilities and the countermeasures being recommended by FPS. In 
addition to more detailed information on these items, FPS also will 
provide additional explanations of the processes it uses to assess risk 
and identify appropriate countermeasures. FPS has worked with many 
agencies to ensure appropriate information sharing and is committed to 
providing information to its stakeholders. With the revised version of 
the Facility Security Assessment report, FPS should be able to provide 
more details to support a comprehensive understanding of the 
recommendations it puts forward. 

Additionally, ICE officials recognize that the draft GAO report 
identifies a number of other serious and substantive issues that impact 
FPS's ability to mitigate risk for federal facilities and their 
occupants. Chief among these is the distributed nature of the decision-
making and funding process for implementing appropriate physical 
security countermeasures at federal facilities. While the report's 
recommendations focus on FPS risk assessment and countermeasures 
methodologies and information sharing, these other issues deserve 
attention and a path toward resolution. FPS will continue to work with 
key stakeholders to provide appropriate security solutions, including 
resolving those situations where, as noted in the report, FPS-
recommended security solutions were not implemented. 

Sincerely, 

Signed by: 

Jerald E. Levine: 
Director: 
Departmental GAO/OIG Liaison Office: 

[End of section] 

Appendix III: Comments from the General Services Administration: 

GSA Public Buildings Service: 
U.S. General Services Administration: 
1800 F Street, NW: 
Washington, DC 20405-0002: 
[hyperlink, http://www.gsa.gov] 

Mark L. Goldstein: 
Director, Physical Infrastructure Issues: 
Government Accountability Office: 
Washington, DC 20548: 

Dear Mr. Goldstein: 

The General Services Administration (GSA) appreciates this opportunity 
to submit agency comments on the Government Accountability Office (GAO) 
draft report, "Greater Attention to Key Practices Would improve the 
Federal Protective Service's Approach to Facility Protection," GAO-09- 
644SU (Draft Report). We agree with the draft report's findings 
concerning the challenges the Federal Protective Service (FPS) faces in 
the delivery of security services in GSA owned and leased buildings.
We will continue to work closely with the FPS to ensure the protection 
of the GSA portfolio, Federal tenants and visitors. In conjunction with 
FPS we will address GAO's recommendation that FPS and GSA reach a 
consensus on the sharing and safeguarding of information contained 
within Building Security Assessments. 

If you have any questions or concerns, please contact me at (202) 501-
1100. 

Sincerely, 

Signed by: 

Anthony E. Costa: 
Acting Commissioner: 

Enclosure: 

[End of section] 

Appendix IV: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

Mark L. Goldstein, (202) 512-2834 or goldsteinm@gao.gov: 

Staff Acknowledgments: 

In addition to the contact named above, David Sausville, Assistant 
Director; Denise McCabe, Analyst-in-Charge; Anne Dilger; Elizabeth 
Eisenstadt; Brandon Haller; Robin Nye; Susan Michal-Smith; and Adam Yu 
made key contributions to this report. 

[End of section] 

Footnotes: 

[1] Following the Oklahoma City bombing, Executive Order 12977 called 
for the creation of an interagency security committee to address the 
quality and effectiveness of physical security requirements for federal 
facilities by developing and evaluating security standards. ISC has 
representation from all major federal departments and agencies. In 
2003, the Chair of the ISC moved from GSA to DHS. 

[2] 6 U.S.C. § 203. 

[3] 6 U.S.C. § 232. 

[4] According to the DHS budget for fiscal year 2010, FPS is to be 
transferred from ICE to NPPD because FPS's responsibilities are outside 
the scope of ICE's immigration and customs enforcement mission and are 
better aligned to NPPD. 

[5] GAO, Homeland Security: Further Actions Needed to Coordinate 
Federal Agencies' Facility Protection Efforts and Promote Key 
Practices, [hyperlink, http://www.gao.gov/products/GAO-05-49] 
(Washington, D.C.: Nov. 30, 2004). 

[6] We have used these key practices as criteria to evaluate how 
entities such as DHS and the Smithsonian Institution secure their 
assets. GAO, Federal Real Property: DHS Has Made Progress, but 
Additional Actions Are Needed to Address Real Property Management and 
Security Challenges, [hyperlink, 
http://www.gao.gov/products/GAO-07-658] (Washington, D.C.: June 22, 
2007). GAO, Smithsonian Institution: Funding Challenges Affect 
Facilities' Conditions and Security, Endangering Collections, 
[hyperlink, 
http://www.gao.gov/products/GAO-07-1127] (Washington, D.C.: Sept. 28, 
2007). 

[7] For the purposes of this review, we did not include key practices 
related to (1) performance measurement and testing, because we reported 
on the limitations FPS faces in assessing its performance in GAO, 
Homeland Security: The Federal Protective Service Faces Several 
Challenges That Hamper Its Ability to Protect Federal Facilities, 
[hyperlink, http://www.gao.gov/products/GAO-08-683] (Washington, D.C.: 
June 11, 2008); (2) aligning assets to mission because GSA, not FPS, 
controls the asset inventory; and (3) strategic management of human 
capital because we are reviewing FPS's management of human capital in a 
separate engagement. Appendix I explains our methodology in detail. 

[8] At the time of our review, FPS evaluated the security level of 
GSA's facilities using Department of Justice (DOJ) standards that 
categorized facilities from level I (low risk) to level V (high risk). 

[9] At the time of our review, a level IV facility had more than 450 
federal employees; more than 150,000 square feet; a high volume of 
public contact; and tenant agencies that could include high-risk law 
enforcement and intelligence agencies, courts, judicial offices, and 
highly sensitive government records. 

[10] According to ISC facility security level determinations standards, 
a campus consists of two or more federal facilities located contiguous 
to one another and typically sharing some aspects of the environment-- 
such as parking, courtyards, private vehicle access roads or gates, or 
entrances to connected facilities. 

[11] At the time of our review, a level III facility had between 151 
and 450 federal employees, 80,000 to 150,000 square feet, and a 
moderate to high volume of public contact. 

[12] 6 U.S.C. § 232 and 40 U.S.C. § 1315. In addition to GSA 
facilities, the Homeland Security Act of 2002 also provides FPS with 
the authority to protect the buildings, grounds, and property of other 
agencies whose functions were transferred to DHS. 

[13] FPS inspectors are also referred to as Law Enforcement Security 
Officers. As of April 2009, FPS had 1,236 employees, of whom 694--or 56 
percent--were inspectors. 

[14] "Patrol" refers to movement within an area for the purpose of 
observation or surveillance to prevent or detect criminal violations, 
maintain security, and be available to provide service and assistance 
to the public. 

[15] According to FPS officials, there is no official policy on the 
number of buildings assigned to each inspector. The number of buildings 
is entirely dependent on the buildings' geographic dispersion and risk 
levels. 

[16] In accordance with the 2006 MOA between DHS and GSA, FPS is 
supposed to conduct security assessments--or "prelease assessments"-- 
for proposed buildings that are generally greater than 10,000 square 
feet. As part of the assessment process, FPS is supposed to inspect the 
building, identify vulnerabilities, and recommend security 
countermeasures. 

[17] FPS is responsible for overseeing about 15,000 contract guards 
that provide security services at GSA buildings. FPS inspectors are 
responsible for conducting contract guard inspections to ensure that 
guards are in compliance with contract requirements; have up-to-date 
certifications for required training, including firearms or cardio 
pulmonary resuscitation training; and are completing assigned duties. 

[18] U.S. Department of Justice, Vulnerability Assessment of Federal 
Facilities, (Washington, D.C., June 28, 1995). 

[19] A BSA is a type of security evaluation conducted by FPS to 
determine how susceptible a facility is to various forms of threats or 
attacks. BSAs include countermeasure recommendations to mitigate 
threats and reduce vulnerabilities. 

[20] On March 10, 2008, ISC issued new standards for determining the 
security level of federal facilities, which supersede the standards 
developed in the DOJ's 1995 vulnerability assessment. FPS is currently 
reassessing building security levels using the updated standards. These 
standards also change the BSA schedule such that level III, IV, and V 
buildings will be assessed at least every 3 years, and level I and II 
buildings will be assessed at least every 5 years. ISC plans to issue 
updated minimum security countermeasure standards during fiscal year 
2009, which FPS intends to implement. 

[21] FPS makes two types of countermeasure recommendations: (1) 
"mandatory" countermeasures are those required to address high risks 
and ISC minimum security or other nationally recognized security 
standards or protocols and (2) "optional" countermeasures are those 
that address moderate or low risks or areas for which minimum ISC 
standards or other nationally recognized security standards or 
protocols may not exist. 

[22] "Security equipment" refers to security items that are easily 
removable from the building, such as X-ray machines, magnetometers, 
closed-circuit television systems and cameras, and intrusion and duress 
alarm systems. 

[23] "Security fixtures" are physical security countermeasures that are 
part of the building, or are attached to and not easily removable from 
the building. Examples include vehicle barriers such as bollards, 
gates, pop-up and arm gates; doors, locks, and card readers at building 
entrances that serve solely as a locking mechanism; parking lot fencing 
and gates; guard booths; and blast-resistant windows. 

[24] GSA funds "mandatory" security fixture recommendations and tenant 
agencies fund "optional" security fixture recommendations through 
reimbursable work authorizations with GSA. 

[25] Issued in 2003, HSPD-7 identified 17 critical infrastructure 
sectors, which include assets, systems, networks, and functions that 
provide vital services to the nation. In March 2008, an 18th sector was 
established--Critical Manufacturing. One of the 18 sectors is the 
Government Facilities sector which includes a wide variety of 
facilities owned or leased by federal, state, local, and tribal 
governments, located domestically and oversees. HSPD-7 designated DHS 
as the Government Facilities sector-specific agency, and DHS in turn 
assigned this responsibility to FPS. 

[26] GAO, Homeland Security: Transformation Strategy Needed to Address 
Challenges Facing the Federal Protective Service, [hyperlink, 
http://www.gao.gov/products/GAO-04-537] (Washington, D.C.: July 14, 
2004). 

[27] [hyperlink, http://www.gao.gov/products/GAO-08-683]. 

[28] 6 U.S.C. § 232. 

[29] GAO, Homeland Security: Actions Needed to Better Protect National 
Icons and Federal Office Buildings from Terrorism, [hyperlink, 
http://www.gao.gov/products/GAO-05-790] (Washington, D.C.: June 24, 
2005). In 2005, GAO recommended that GSA establish a mechanism that 
could serve as a liaison between FPS and tenant agencies, work to 
address the challenges GSA faces related to security in its buildings, 
and enable GSA to define its overall role in security following the 
transfer of FPS to DHS. 

[30] PBS, a component within GSA, acquires space on behalf of the 
federal government through new construction and leasing, and acts as a 
caretaker for federal properties across the country. PBS is funded 
primarily through the Federal Buildings Fund, which is supported by 
rent from federal customer agencies. 

[31] ISC includes representation from the Departments (listed in order 
of presidential succession) of State, Treasury, Defense, Justice, 
Interior, Agriculture, Commerce, Labor, Health and Human Services, 
Housing and Urban Development, Transportation, Energy, Education, 
Homeland Security, and Veterans Affairs; GSA; the Environmental 
Protection Agency; the Central Intelligence Agency; and the Office of 
Management and Budget. Other members of ISC include the Director, U.S. 
Marshals Service; the Director, Security Policy Board; and the 
Assistant to the President for National Security Affairs. As a member 
of ISC, the Department of Defense participates in meetings to ensure 
that its physical security policies are consistent with ISC security 
standards and policy guidance, according to the Executive Director of 
ISC. 

[32] Executive Order 13286, dated February 28, 2003, amended numerous 
executive orders to reflect the transfer of certain functions and 
responsibilities to the Secretary of Homeland Security. Section 23 of 
the Executive Order transferred the ISC chair responsibility from GSA 
to DHS. 

[33] [hyperlink, http://www.gao.gov/products/GAO-05-49]. 

[34] [hyperlink, http://www.gao.gov/products/GAO-05-49]. 

[35] [hyperlink, http://www.gao.gov/products/GAO-07-1127]. 

[36] GAO, National Mall: Steps Identified by Stakeholders Facilitate 
Design and Approval of Security Enhancements, [hyperlink, 
http://www.gao.gov/products/GAO-05-518] (Washington, D.C.: June 14, 
2005). 

[37] [hyperlink, http://www.gao.gov/products/GAO-07-658]. 

[38] ISC, Use of Physical Security Performance Measures, (Washington, 
D.C., June 16, 2009). 

[39] [hyperlink, http://www.gao.gov/products/GAO-05-49]. 

[40] [hyperlink, http://www.gao.gov/products/GAO-08-683]. 

[41] The NIPP was founded through HSPD-7 and sets forth national policy 
on how the plan's risk management framework and sector partnership 
model are to be implemented by sector-specific agencies. FPS is the 
agency responsible for the Government Facilities sector. 

[42] [hyperlink, http://www.gao.gov/products/GAO-07-658]. 

[43] [hyperlink, http://www.gao.gov/products/GAO-08-683]. 

[44] In June 2009, FPS officials told us that tenant agency 
representatives received the BSA executive summary in October 2008 from 
FPS and that they would provide the BSA executive summary to the GSA 
property manager for the campus. 

[45] The original objective of RAMPART was to implement a risk 
assessment methodology in software and create a user interface that 
allowed GSA employees without risk assessment backgrounds to perform 
and interpret a risk assessment for real property and begin to mitigate 
risk. 

[46] [hyperlink, http://www.gao.gov/products/GAO-08-683]. 

[47] In accordance with FPS's BSA Policy Document (FPS-07-004), some 
federal agencies with law enforcement or security missions have the 
personnel and the resources to conduct risk assessments of their own 
facilities and may not want FPS to conduct a BSA. In these instances, a 
BSA waiver is completed and signed by the agencies and FPS. 

[48] Under RAMP, FPS will use the term, "Facility Security Assessment" 
instead of BSA. 

[49] [hyperlink, http://www.gao.gov/products/GAO-08-683]. 

[50] ISC, Facility Security Level Determinations for Federal 
Facilities, an Interagency Security Committee Standard, (Washington, 
D.C., Mar. 10, 2008). 

[51] ISC officials told us they expect to issue updated standards for 
physical security countermeasures--which support the updated standards 
for facility security levels--by the end of fiscal year 2009. 

[52] [hyperlink, http://www.gao.gov/products/GAO-05-49]. 

[53] [hyperlink, http://www.gao.gov/products/GAO-05-49]. 

[54] GSA acquires security fixtures through its Federal Acquisition 
Service, which procures goods and services for the federal government. 

[55] According to FPS officials, the design and methodology for its new 
"Physical Security Refresher Training Program" has been completed and 
training is scheduled to begin in January 2010. 

[56] According to its Web site, ASIS International--an organization 
that reports having more than 36,000 security industry members--is the 
preeminent international organization for professionals responsible for 
security, including managers and directors of security. 

[57] Other relevant ISC standards include: (1) ISC Security Design 
Criteria for new Federal Office Buildings and Major Modernization 
Projects and (2) Security Standards for Leased Space. 

[58] GSA Schedule 84 provides agencies with access to a range of 
established security services and product contracts. 

[59] The Science and Technology Directorate is DHS's primary research 
and development arm. Its mission is to provide federal, state, and 
local officials with the technology and capabilities to protect the 
homeland. 

[60] [hyperlink, http://www.gao.gov/products/GAO-05-49]. 

[61] [hyperlink, http://www.gao.gov/products/GAO-05-49]. 

[62] GAO, High-Risk Series: An Update, [hyperlink, 
http://www.gao.gov/products/GAO-05-207] (Washington, D.C.: Jan. 1, 
2005). 

[63] FPS Strategic Plan: Secure Facilities, Safe Occupants, Fiscal 
Years 2008 to 2011. 

[64] Once FPS implements ISC's updated facility security level 
standards, BSAs will be conducted at least every 3 or 5 years depending 
on the security level. 

[65] GAO, Information Sharing: Practices That Can Benefit Critical 
Infrastructure Protection, [hyperlink, 
http://www.gao.gov/products/GAO-02-24] (Washington, D.C.: Oct. 15, 
2001). 

[66] In June 2009, tenant agency representatives told us that at all 
times, they had been aware of the location of the equipment and assured 
proper safeguarding of the equipment during the reconstruction process. 

[67] In May 2009, FPS officials told us that FPS's Policy Review 
Committee and Management-Union Working Group were reviewing the FPS 
Interim Critical Incident Response Plan and making recommendations 
regarding a proposed Crisis Response Team Policy. 

[68] GAO, National Preparedness: Technologies to Secure Federal 
Buildings, [hyperlink, http://www.gao.gov/products/GAO-02-687T] 
(Washington, D.C.: Apr. 25, 2002). 

[69] GAO, Building Security: Security Responsibilities for Federally 
Owned and Leased Facilities, [hyperlink, 
http://www.gao.gov/products/GAO-03-8] (Washington, D.C.: Oct. 31, 
2002). 

[70] 6 USC § 203; see also 6 USC § 232. 

[71] According ICE policy, LES information is a type of SBU information 
that is compiled for law enforcement purposes, the unauthorized 
disclosure of which could adversely impact the conduct of law 
enforcement programs or the privacy or welfare of involved persons. 

[72] DHS Management Directive 11042.1, Safeguarding Sensitive But 
Unclassified Information. 

[73] ICE Directive 73003.1, Safeguarding Law Enforcement Sensitive 
Information. 

[74] [hyperlink, http://www.gao.gov/products/GAO-05-207]. 

[75] GAO, Transportation Security Administration: Clear Policies and 
Oversight Needed for Designation of Sensitive Security Information, 
[hyperlink, http://www.gao.gov/products/GAO-05-677] (Washington, D.C.: 
June 29, 2005). 

[76] GAO, Transportation Security Administration's Processes for 
Designating and Releasing Sensitive Security Information, [hyperlink, 
http://www.gao.gov/products/GAO-08-232R] (Washington, D.C.: Nov. 30, 
2007). 

[77] HSPD-12 is the policy for a common identification standard for 
federal employees and contractors. Its purpose is to enhance security, 
increase government efficiency, reduce identity fraud, and protect 
personal privacy by establishing a mandatory, government-wide standard 
for secure and reliable forms of identification issued by the federal 
government to its employees and contractors. 

[78] PBS 3490.1A Document Security for Sensitive But Unclassified 
Building Information (June 1, 2009). This document canceled PBS 3490.1 
Document Security for Sensitive But Unclassified Paper and Electronic 
Building Information (Mar. 8, 2002). 

[79] FPS Strategic Plan, Secure Facilities, Safe Occupants, Fiscal 
Years 2008 to 2011. 

[80] [hyperlink, http://www.gao.gov/products/GAO-05-207]. 

[81] FPS MegaCenters provide three primary security services--alarm 
monitoring, radio monitoring, and dispatching of FPS and contract 
guards. 

[82] GAO, Homeland Security: Further Actions Needed to Coordinate 
Federal Agencies' Facility Protection Efforts and Promote Key 
Practices, [hyperlink, http://www.gao.gov/products/GAO-05-49] 
(Washington D.C., Nov. 30, 2004). 

[83] At the time of our review, a level IV facility had over 450 
federal employees; more than 150,000 square feet; a high volume of 
public contact; and tenant agencies that could include high-risk law 
enforcement and intelligence agencies, courts, judicial offices, and 
highly sensitive government records. 

[84] At the time of our review, a level III facility had between 151 
and 450 federal employees, more than 80,000 to 150,000 square feet and 
a moderate to high volume of public contact. 

[85] The U.S. Department of Justice, DOJ Vulnerability Assessment of 
Federal Facilities (Washington, D.C.: June 28, 1995). 

[End of section] 

GAO's Mission: 

The Government Accountability Office, the audit, evaluation and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the performance 
and accountability of the federal government for the American people. 
GAO examines the use of public funds; evaluates federal programs and 
policies; and provides analyses, recommendations, and other assistance 
to help Congress make informed oversight, policy, and funding 
decisions. GAO's commitment to good government is reflected in its core 
values of accountability, integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each 
weekday, GAO posts newly released reports, testimony, and 
correspondence on its Web site. To have GAO e-mail you a list of newly 
posted products every afternoon, go to [hyperlink, http://www.gao.gov] 
and select "E-mail Updates." 

Order by Phone: 

The price of each GAO publication reflects GAO’s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO’s Web site, 
[hyperlink, http://www.gao.gov/ordering.htm]. 

Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537. 

Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional 
information. 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: 
E-mail: fraudnet@gao.gov: 
Automated answering system: (800) 424-5454 or (202) 512-7470: 

Congressional Relations: 

Ralph Dawn, Managing Director, dawnr@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, D.C. 20548: 

Public Affairs: 

Chuck Young, Managing Director, youngc1@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, D.C. 20548: