This is the accessible text file for GAO report number GAO-07-89 
entitled 'Homeland Security: Opportunities Exist to Enhance 
Collaboration at 24/7 Operations Centers Staffed by Multiple DHS 
Agencies' which was released on October 20, 2006. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

United States Government Accountability Office: 

Report to Congressional Requesters: 

GAO: 

October 2006: 

Homeland Security: 

Opportunities Exist to Enhance Collaboration at 24/7 Operations Centers 
Staffed by Multiple DHS Agencies: 

Homeland Security: 

GAO-07-89: 

GAO Highlights: 

Highlights of GAO-07-89, a report to congressional requesters 

Why GAO Did This Study: 

Because terrorists do not operate on a 9-5 schedule, the Department of 
Homeland Security (DHS) and its operational components have established 
information gathering and analysis centers that conduct activities 24 
hours a day, 7 days a week, 365 days a year. Staff at these operations 
centers work to help detect, deter, and prevent terrorist acts. DHS has 
determined that out of 25 operations centers, four require higher 
levels of collaboration that can only be provided by personnel from 
multiple DHS agencies, and other federal, and sometimes state and 
local, agencies. For these four multi-agency operations centers, this 
report (1) describes their missions, products, functions, and customers 
and (2) assesses the extent to which DHS efforts to promote 
collaboration among the multiple agencies responsible for the centers 
reflect key practices for enhancing and sustaining collaborative 
efforts. To do so, GAO visited operations centers, reviewed data and 
reports from the centers, and interviewed center and other DHS 
officials. 

What GAO Found: 

Each of the four multi-agency 24/7/365 operations centers has a 
different mission and therefore produces different products, yet all 
contribute to the larger mission of DHS and have similar functions and 
customers. Customs and Border Protection runs two of the four multi-
agency operations centers—the National Targeting Center and the Air and 
Marine Operations Center. The former monitors the international 
movement of potential terrorists and produces reports on suspect 
individuals; the latter maintains situational awareness of the nation’s 
airspace, general aviation, and sea-lanes and produces reports on 
suspicious private air and marine craft. The Transportation Security 
Administration’s operations center monitors passengers on commercial 
flights; works to mitigate the vulnerabilities of commercial airports, 
rail stations, and pipelines, the National Capital Region, and critical 
infrastructure across the nation; and produces reports on these topics. 
DHS’s Operations Directorate runs the National Operations Center 
Interagency Watch and works to enhance efficiency and collaboration 
among DHS components. This operations center has a more strategic 
mission in that it uses information gathered by the other operations 
centers to provide overall national situational awareness, and it 
prepares security briefs for federal, state, and local law enforcement 
agencies. 

Opportunities exist to enhance collaboration among 24/7/365 multi-
agency operations centers. While DHS has leveraged resources by having 
staff from multiple agencies work together, the centers lack joint 
strategies for collaboration and staffing needs assessments, and they 
have not established a definition of watchstander roles for all 
agencies at each center. The centers also lack standards and procedures 
for using DHS’s primary information sharing network; mechanisms to 
monitor, evaluate, and report on results; and reinforced accountability 
through agency plans and reports. GAO’s previous work has shown that 
such practices are effective in enhancing and sustaining collaboration 
among federal agencies. The establishment of DHS’s Operations 
Directorate in 2005 provides a means to promote implementation of more 
collaborative practices at the centers. 

Figure: Staff Working to Maintain Situational Awareness at Operations 
Centers: 

[See PDF for Image] 

Sources: from left to right: TSA and CBP. 

[End of Figure] 

What GAO Recommends: 

GAO recommends that the Director of the DHS Operations Directorate 
provide guidance to multi-agency operations centers to implement key 
practices to enhance and sustain collaboration. DHS agreed with our 
recommendations and identified a number of actions that the Operations 
Directorate plans to take to enhance collaboration. 

[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-89]. 

To view the full product, including the scope and methodology, click on 
the link above. For more information, contact Paul L. Jones at (202)512-
8777 or jonespl@gao.gov. 

[End of Section] 

Contents: 

Letter: 

Results in Brief: 

Background: 

While the Four Multi-Agency Operations Centers' Missions and Products 
Differ, Functions and Customers Are Similar: 

Opportunities Exist to Enhance Collaboration at DHS's Four Multi-Agency 
Operations Centers: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Appendix I: Missions of 24/7/365 DHS Centers Staffed by One DHS 
Component: 

Appendix II: Objectives, Scope, and Methodology: 

Appendix III: Comments from the Department of Homeland Security: 

Appendix IV: GAO Contact and Staff Acknowledgments: 

Tables: 

Table 1: 24/7/365 DHS National Operations Centers Staffed by Multiple 
DHS Agencies: 

Table 2: Description of the Functions Performed by the Four DHS Multi- 
Agency Operations Centers: 

Figures: 

Figure 1: Organizations within the Department of Homeland Security That 
Conduct 24/7/365 Activities: 

Figure 2: Air and Marine Operations Center Sources of Information and 
Data: 

Figure 3: National Targeting Center Sources of Information and Data at 
and between the Nation's Ports of Entry: 

Figure 4: Modes of Transportation Monitored by the Transportation 
Security Operations Center: 

Figure 5: National Operations Center-Interagency Watch Information and 
Data Sources: 

Abbreviations: 

AMOC: Air and Marine Operations Center: 

CBP: Customs and Border Protection: 

DHS: Department of Homeland Security: 

FEMA: Federal Emergency Management Agency: 

HSIN: Homeland Security Information Network: 

ICE: Immigration and Customs Enforcement: 

NOC: National Operations Center: 

NOC-Watch: National Operations Center-Interagency Watch: 

NT: National Targeting Center: 

TSA: Transportation Security Agency: 

TSOC: Transportation Security Operations Center: 

USCG: United States Coast Guard: 

USSS: United States Secret Service: 

[End of section] 

United States Government Accountability Office: 
Washington, DC 20548: 

October 20, 2006: 

The Honorable Susan M. Collins: 
Chairman, Committee on Homeland Security and Governmental Affairs: 
United States Senate: 

The Honorable Norm Coleman: 
Chairman, Permanent Subcommittee on Investigations: 
Committee on Homeland Security and Governmental Affairs: 
United States Senate: 

The Homeland Security Act of 2002[Footnote 1] established the 
Department of Homeland Security (DHS) with the primary mission of 
preventing terrorist attacks against the United States. To accomplish 
this mission, DHS must be aware of the potential risks and 
vulnerabilities faced by the nation, including terrorist threats to our 
transportation infrastructure (such as rail, aviation, and shipping); 
terrorists entering our country through land, air, and sea ports; and 
terrorists operating within our borders. Because terrorists do not 
operate on a 9-to-5 schedule, DHS and some of its operational 
components (six DHS agencies and DHS's Operations Directorate[Footnote 
2]) have established information gathering and/or analysis centers that 
conduct activities 24 hours a day, 7 days a week, 365 days a year. 
Staff at these operations centers conduct monitoring and surveillance 
activities to help detect, deter, and prevent terrorist acts by 
providing real-time situational awareness to a variety of federal, 
state, and local governments and private-sector entities. According to 
DHS, this constant situational awareness is needed to facilitate an 
immediate response during times of crisis or other national incidents. 

The six DHS agencies and the DHS Operations Directorate that run 
national operations centers "24/7/365" gather and/or analyze 
information through monitoring and surveillance activities to help 
detect, deter, and prevent terrorist acts across the entire United 
States.[Footnote 3] In addition, DHS conducts other 24/7/365 
activities, such as telecommunications services, security alarm 
monitoring, and region-specific operations at a variety of other 
centers. We identified a total of 20 national and 5 regional DHS 
centers that conduct 24/7/365 activities.[Footnote 4] Twenty-one of the 
25 centers employ staff from one DHS agency on a regular full-time 
basis and perform agency-specific functions. Appendix I provides 
details on the missions and functions of these centers. 

DHS has determined that the remaining 4 centers have broader security 
missions and require higher levels of collaboration that can only be 
provided by personnel from multiple DHS agencies, and other federal, 
and sometimes state and local, agencies. In January 2003, we designated 
implementation and transformation of the new Department of Homeland 
Security as high risk based on three factors: the enormity of the 
effort, the challenges faced by the components, and the potential 
impact of failure to effectively carry out the homeland security 
mission.[Footnote 5] Given the critical homeland security role played 
by these operations centers and the opportunity to facilitate the 
department's transformation efforts by maximizing collaboration at the 
program level, this report focuses on these four national operations 
centers that are "multi-agency," that is, staffed by personnel from 
more than one agency within DHS, along with other federal, and 
sometimes state and local, agencies. The 4 centers are described in 
table 1. 

Table 1: 24/7/365 DHS National Operations Centers Staffed by Multiple 
DHS Agencies: 

Sponsoring organization: center: Customs and Border Protection (CBP); 
Air Marine and Operations Center (AMOC)[A];  
Mission: To detect, sort, track, and facilitate the interdiction of 
criminal entities throughout the Western Hemisphere, by utilizing 
integrated air and marine forces, the latest technology, and tactical 
intelligence; 
Other participating DHS agencies: U.S. Coast Guard; 
Other participating agencies outside DHS: Federal Aviation 
Administration; Department of Defense National Guard Bureau-Air 
National Guard; Government of Mexico. 

Sponsoring organization: center: National Targeting Center (NTC); 
Mission: To coordinate and support all agency field-level anti- 
terrorism activities by providing tactical targeting and analytical 
research, and to be a single point of reference for all agency anti- 
terrorism efforts; 
Other participating DHS agencies: Immigration and Customs Enforcement; 
Federal Air Marshals; Transportation Security Administration; U.S. 
Coast Guard; 
Other participating agencies outside DHS: Federal Bureau of 
Investigation; Department of State; Food and Drug Administration; U.S. 
Department of Agriculture. 

Sponsoring organization: center: Transportation Security Administration 
(TSA); Transportation Security Operations Center (TSOC)[B]; 
Mission: To provide situational awareness and information sharing in 
day-to-day coordination and incident management for all transportation 
security-related operations and issues worldwide by monitoring, 
responding to, and investigating security incidents involving all 
transportation sectors; 
Other participating DHS agencies: U.S. Secret Service[C]; Customs and 
Border Protection[C]; 
Other participating agencies outside DHS: Federal Bureau of 
Investigation; Federal Aviation Administration; U.S. Capitol Police; 
U.S. Air Force; D.C. Metro Police. 

Sponsoring organization: center: DHS Operations Directorate; National 
Operations Center Interagency Watch (NOC-Watch)[D]; 
Mission: To act as the primary national-level hub for domestic 
situational awareness, common operating picture, combining and sharing 
of information, communications, and operations coordination pertaining 
to the prevention of terrorist attacks and domestic incident management 
by facilitating information sharing with other federal, state, local, 
tribal, and nongovernmental emergency operations centers; and by fusing 
law enforcement, national intelligence, emergency response, and private-
sector reporting; 
Other participating DHS agencies: U.S. Secret Service; Immigration and 
Customs Enforcement; Federal Protective Service; Federal Air Marshals; 
Transportation Security Administration; Customs and Border Protection; 
U.S. Coast Guard; Federal Emergency Management Agency; 
Other participating agencies outside DHS: Central Intelligence Agency; 
Defense Intelligence Agency; National Security Agency; National 
Geospatial-Intelligence Agency; Federal Bureau of Investigation; 
Department of Interior; Drug Enforcement Administration; Alcohol, 
Tobacco, Firearms and Explosives; Virginia State Police; Fairfax County 
Police; New York, Boston, and Los Angeles police departments. 

Source: GAO generated based on information from DHS. 

[A] On August 22, 1988, the Customs Air Interdiction Program 
established the Command, Control, Communications, and Intelligence 
Center, West, at March Air Force Base in Riverside, California. In 
October 1994, the facility was renamed the Domestic Air Interdiction 
Coordination Center. In 1999, marine programs were merged with air 
interdiction programs, and the name of the Riverside facility was 
changed to the Air and Marine Interdiction Coordination Center. 
Effective March 1, 2003, the center was renamed the Air and Marine 
Operations Center. 

[B] The TSOC comprises three watch functions--the National Capital 
Region Coordination Center is responsible for National Capital Region 
air security and defense functions; the National Infrastructure 
Coordination Center is responsible for continuously assessing the 
status of the nation's critical infrastructure and key resources; and 
the TSA Command Watch is responsible for coordinating the execution of 
the TSOC mission. 

[C] The National Capital Region Command Center, one of three watch 
functions of the TSOC, constitutes the multi-agency element because it 
is staffed by other DHS component agencies--the U.S. Secret Service and 
CBP. 

[D] Prior to May 25, 2006, the National Operations Center-Interagency 
Watch was called the Homeland Security Operations Center. The 
Interagency Watch also incorporates staff from DHS's Offices of 
Information & Analysis; Infrastructure Protection, and Incident 
Management Division, as well as a variety of other DHS and non-DHS 
organizations. 

[End of table] 

To assess the collaboration among DHS agencies working at each multi- 
agency 24/7/365 operations center, this report answers the following 
questions: 

1. What are the missions, functions, and products of the multi-agency 
24/7/365 DHS operations centers and who are their customers? 

2. To what extent has DHS implemented key practices for enhancing and 
sustaining collaboration at these multi-agency centers? 

To answer our first objective, we analyzed information obtained from 
the responsible component agencies and the Operations Directorate on 
the mission and functions of all of the 24/7/365 activities in DHS. We 
visited all 4 multi-agency centers, as well as centers operated by 
other component agencies including the Federal Emergency Management 
Agency, the U.S. Coast Guard, and the U.S. Secret Service to observe 
their operations, interview officials responsible for managing the 
centers, and identify centers that employed staff from multiple DHS 
agencies.[Footnote 6] From the 4 national operations centers that 
employed staff from multiple DHS component agencies--the Air and Marine 
Operations Center (AMOC), the National Targeting Center (NTC), the 
Transportation Security Operations Center (TSOC), and the National 
Operations Center-Interagency Watch (NOC-Watch)--we obtained additional 
information on both the products the centers regularly developed and 
their primary customers. We also interviewed several staff assigned to 
centers from participating DHS component agencies-- referred to as 
watchstanders[Footnote 7]--to discuss their roles and responsibilities 
at the centers and the overall mission of the centers to which they had 
been assigned. 

To answer our second objective, we met with the acting director and 
other responsible officials from the Operations Directorate to discuss 
its role and responsibilities. We reviewed transition, management 
integration, and planning and policy documents as well as strategic 
plans and annual performance reports and planning documents from DHS 
and its component agencies. We also reviewed and analyzed the results 
of studies undertaken by DHS to assess and improve coordination and 
collaboration at the multi-agency centers as well as reports from GAO, 
the Congressional Research Service, the DHS Office of Inspector 
General, and others that addressed the integration, coordination, and 
collaboration of departmentwide program functions. We then assessed 
DHS's efforts related to integration, coordination, and collaboration 
at the multi-agency centers to determine the extent to which they 
reflect DHS's application of the key practices we have found can help 
enhance and sustain collaboration among federal agencies and found to 
be at the center of successful mergers and transformations.[Footnote 8] 

We conducted our work from October 2005 through September 2006 in 
accordance with generally accepted government auditing standards. 
Appendix II includes more detailed information on our scope and 
methodology. 

Results in Brief: 

The four multi-agency operations centers each have their own mission 
and generate different products while performing some similar functions 
and sharing a number of customers. The missions of the AMOC, NTC, and 
TSOC are tactical, including such activities as monitoring the nation's 
airspace, the movement of potential terrorists, and the passengers on 
commercial flights, respectively. NOC-Watch's mission is more strategic 
in that it collects information gathered by the other multi-agency 
operations centers[Footnote 9] and provides a national perspective on 
situational awareness for potential terrorist activity. The products of 
the four multi-agency operations centers reflect their different 
missions and range from reports on suspicious private air and marine 
craft from the AMOC, individuals entering the country at land, sea and 
airports from the NTC, and individuals traveling on commercial flights 
from the TSOC, to an overview of the national threat environment from 
the NOC-Watch. The multi-agency operations centers all share common 
functions such as maintaining situational awareness, information 
sharing and communications; coordinating internal operations and 
coordinating among federal, state, local, tribal, and private-sector 
entities; and managing incidents and making decisions. In addition, the 
AMOC and NOC-Watch exercise operational command and control and, along 
with the NTC, coordinate with foreign governments. The four multi- 
agency operations centers' primary customers include federal, state, 
and local governments; private-sector entities; and some foreign 
governments. 

DHS has leveraged its resources--one key collaborative practice--by 
having staff from multiple agencies work together at the four 
operations centers. However, opportunities exist to further implement 
this and the other relevant practices that our previous work has 
identified as important to enhancing and sustaining collaboration among 
federal agencies. Specifically, not all of the components responsible 
for managing the operation centers have: 

* established goals to define and articulate a common outcome and 
mutually reinforcing or joint strategies for collaboration (related to 
two of our key practices); 

* assessed staffing needs to leverage resources; 

* defined roles and responsibilities of watchstanders from agencies 
other than the managing one; 

* applied standards, policies, and procedures for DHS's information 
sharing network to provide a means to operate across agency boundaries; 

* prepared mechanisms to monitor, evaluate, and report on results of 
the operations centers to reinforce collaborative efforts; and: 

* reinforced agency accountability for collaboration efforts through 
agency plans and reports. 

For example, some DHS components have established a variety of internal 
and external working agreements, memorandums, and in the case of the 
Joint Field Offices, standard operating procedures. However, DHS's 
Operations Directorate, which is responsible for coordinating 
operations, has not provided guidance on how and when such agreements 
should be used to improve collaboration among the sponsoring and 
participating components at the operations centers we reviewed. Nor 
have any of these centers documented goals or joint strategies using 
these or other types of agreements. Without having a documented joint 
strategy for collaboration, there is a risk that center staff 
monitoring potential terrorist activities may not operate in the most 
collaborative manner. DHS has also not assessed staffing needs to 
leverage resources and help ensure that there are enough watchstanders, 
who occupy the primary positions at the multi-agency operations 
centers, to conduct surveillance activities. While three of the four 
multi-agency operations centers had developed descriptions for the 
watchstander position staffed by their own agency, only one center--the 
AMOC--had also developed a position description for staff assigned to 
the center from another DHS agency. The other centers relied on the 
components providing staff to define their watchstanders' roles and 
responsibilities. Lack of a consistent definition for the watchstander 
position may lead to people at the same center in the same role 
performing the same responsibilities differently or not at all. Because 
of the potentially critical, time-sensitive need for decisive action at 
24/7/365 operations centers, it is important that the roles and 
responsibilities of watchstanders are described and understood by both 
the staff and the officials responsible for managing the operations 
centers. In another example, DHS had not provided the standards, 
policies, and procedures for the use of its Homeland Security 
Information Network, its primary information-sharing tool. Without the 
application of the standards, policies, and procedures, users were 
unsure of how to use the network and, therefore, did not maximize the 
operation centers' capacity for sharing security-related information. 
In terms of monitoring, evaluating, and reporting the results of joint 
efforts at the multi-agency operations centers, in January 2004, AMOC 
began collecting data to measure productivity, but had not yet 
evaluated efforts, and the rest of the multi-agency centers have not 
developed any methods for evaluating and reporting results. Finally, 
neither DHS nor the multi-agency operations centers have reinforced 
accountability for collaborative efforts through joint agency planning 
and reporting. Such public accounting through published strategic and 
annual performance plans and reports makes agencies answerable for 
collaboration results. The Operations Directorate, established in 
November 2005 to improve operational efficiency and coordination, 
provides DHS with an opportunity to more fully implement the key 
practices that are important to enhancing and sustaining collaboration 
at its multi-agency operations centers. Although the Operations 
Directorate does not possess administrative, budgetary, or operational 
control over the other component's operations centers, guidance from 
the Operations Directorate could help the other components responsible 
for the 24/7/365 multi-agency operations centers make key advances in 
each collaborative practice. 

To provide a setting for enhanced collaboration among the staff at each 
operations center, we recommend that the Secretary of the Department of 
Homeland Security charge the Director of the Operations Directorate 
with developing and providing guidance and helping to ensure the three 
component agencies of the four multi-agency operations centers take the 
following six actions: define common goals and joint strategies; 
clarify the roles and responsibilities for watchstanders; apply 
standards, policies, and procedures for using DHS's information 
network; conduct staffing needs assessments; prepare mechanisms to 
monitor, evaluate, and report on the results of collaborative efforts; 
and address collaborative efforts at the four multi-agency operations 
centers in plans and reports. 

In reviewing a draft of this report, DHS agreed with the recommended 
actions to enhance collaboration at the DHS multi-agency operations 
centers. Among other things, DHS noted plans to conduct an independent 
study, initiated in September 2006, to leverage technical and 
analytical expertise to support expanding the capabilities of the 
Operations Directorate. In addition, DHS said it plans to move elements 
of the National Operations Center to the Transportation Security 
Operations Center in 2007 and, ultimately to colocate the DHS 
headquarters, and all the DHS component headquarters along with their 
respective staffs and operations centers, at one location. We agree 
that these leadership efforts provided by the Operations Directorate 
could further enhance collaboration among DHS's component agencies, 
along with the key practices suggested by our review of collaboration 
practices among agencies across the federal government. DHS's written 
comments are presented in appendix III. 

Background: 

Twenty-two Agencies Merged to Form DHS in the Aftermath of 9/11: 

DHS was created in response to the terrorist attacks on September 11, 
2001. Not since the creation of the Department of Defense in 1947 has 
the federal government undertaken an organizational merger of this 
magnitude. Enacted on November 25, 2002, the Homeland Security Act 
established DHS by merging 22 distinct agencies and organizations with 
multiple missions, values, and cultures.[Footnote 10] The 22 agencies 
whose powers were absorbed or in part assumed by DHS came from eight 
different departments (Agriculture, Commerce, Defense, Energy, Health 
and Human Services, Justice, Transportation, and the Treasury) and two 
independent offices (the Federal Emergency Management Agency and the 
General Services Administration). In addition, DHS merged 
responsibilities from former agencies to create some new agencies, such 
as Customs and Border Protection. On March 1, 2003, DHS officially 
began operations as a new department. DHS is among the largest federal 
government agencies, with approximately 180,000 employees and an 
estimated budget of $43.6 billion for fiscal year 2007. 

DHS's mission is to lead the unified national effort to secure America, 
prevent and deter terrorist attacks, protect against and respond to 
threats and hazards to the nation, ensure safe and secure borders, 
welcome lawful immigrants and visitors, and promote the free flow of 
commerce. Six of the seven primary operational agencies, and the 
Operations Directorate of the department, have identified the need to 
conduct activities in support of the homeland security mission 24 hours 
a day, 7 days a week, 365 days a year. The department's July 2006 
organizational chart, as illustrated in figure 1, highlights these six 
agencies and the Operations Directorate. 

Figure 1: Organizations within the Department of Homeland Security That 
Conduct 24/7/365 Activities: 

[See PDF for image] 

Source: DHS. 

[End of figure] 

Three DHS Components Sponsor Multi-Agency Operations Centers: 

The three components of DHS that have overall responsibility for the 
four multi-agency 24/7/365 operations centers were created in response 
to the events of September 11, 2001, and the subsequent establishment 
of DHS. By merging portions of the Immigration and Naturalization 
Service and the U.S. Department of Agriculture with elements of U.S. 
Customs, CBP was created as part of DHS in 2003 to protect the nation's 
borders in order to prevent terrorists and terrorist weapons from 
entering or exiting the United States while facilitating the flow of 
legitimate trade and travel. CBP sponsors two 24/7/365 multi-agency 
operations centers: the Air and Marine Operations Center and the 
National Targeting Center. TSA, established in 2001 (as part of the 
Department of Transportation), and incorporated into DHS in 2003, 
protects the nation's transportation systems to ensure freedom of 
movement for people and commerce and sponsors the Transportation 
Security Operations Center. DHS established the Office of Operations 
Coordination (referred to as the Operations Directorate) after a broad 
internal review in 2005. The Operations Directorate, which sponsors the 
National Operations Center (includes the previous Homeland Security 
Operations Center), is responsible for coordinating internal and 
external operational issues throughout the department, conducting 
incident management, and facilitating rapid staff planning and 
execution.[Footnote 11] The three sponsoring components provide overall 
direction and management for their respective centers. 

Transformation Challenges and Practices That Can Help Enhance and 
Sustain Collaboration among Federal Agencies: 

We have previously reported that establishing the new DHS is an 
enormous undertaking and the new department needs to build a successful 
transformation that does the following: instills the organization with 
important management principles; rapidly implements a phased-in 
transition plan; leverages the new department and other agencies in 
executing the national homeland security strategy; and builds 
collaborative partnerships with federal, state, local, and private- 
sector organizations.[Footnote 12] 

DHS faces significant management and organizational transformation 
challenges as it works to protect the nation from terrorism and 
simultaneously establish itself. For these reasons, in January 2005, we 
continued to designate the implementation and transformation of the 
department as high risk. DHS's Inspector General reported, in December 
2004, that integrating DHS's many separate components into a single, 
effective, efficient, and economical department remains one of its 
biggest challenges.[Footnote 13] We also reported in 2005 that agencies 
can enhance and sustain their collaborative efforts by engaging in 
eight key management practices:[Footnote 14] 

* defining and articulating a common outcome; 

* establishing mutually reinforcing or joint strategies; 

* identifying and addressing needs by leveraging resources; 

* agreeing on roles and responsibilities; 

* establishing compatible policies, procedures, and other means to 
operate across agency boundaries; 

* developing mechanisms to monitor, evaluate, and report on results of 
collaborative efforts; 

* reinforcing agency accountability for collaborative efforts through 
agency plans and reports; and: 

* reinforcing individual accountability for collaborative efforts 
through performance management systems. 

Although there is no commonly accepted definition for collaboration, in 
our previous assessment of collaborative efforts among federal agencies 
we defined it as any joint activity by two or more organizations that 
is intended to produce more public value than could be produced when 
the organizations act alone. This report focuses on the actions DHS and 
its components have taken to make collaboration at multi-agency 
operations centers as effective as possible. Joint activities take 
place at operations centers where multiple components staff 
watchstander positions and provide liaison, expertise, and access to 
information that would not otherwise be on hand. For this report, we 
selected the first seven of the eight key practices listed above and 
assessed the first two key practices together, thereby reducing our 
focus to six areas. We did not address the eighth practice--reinforcing 
individual accountability for collaborative efforts through performance 
management systems--because an in-depth examination of component 
agencies' performance management systems was beyond the scope of this 
review. 

While the Four Multi-Agency Operations Centers' Missions and Products 
Differ, Functions and Customers Are Similar: 

The four multi-agency operations centers each have their own mission 
and generate different products while performing similar functions and 
sharing a number of customers. The missions of the AMOC, NTC, and TSOC 
are tactical, including such activities as monitoring the nation's 
airspace, the movement of potential terrorists, and the passengers on 
commercial flights, respectively. NOC-Watch's mission is more strategic 
in that it collects information gathered by the other multi-agency 
operations centers[Footnote 15] and provides a national perspective on 
situational awareness. The products of the four multi-agency operations 
centers reflect their different missions and range from reports on 
suspect individuals traveling on commercial flights to reports on 
suspicious private air and marine craft. The multi-agency operations 
centers all share some common functions: maintaining situational 
awareness and information sharing and communications; coordinating 
internal operations and coordinating among federal, state, local, 
tribal, and private-sector entities; and managing incidents and making 
decisions. While all the multi-agency operations centers share common 
customers, such as foreign, federal, state, and local governments, the 
NOC-Watch has a larger number of customers, given its role as a hub for 
overall situational awareness. 

The Different Missions of the Four Multi-Agency Operations Centers 
Result in Different Products: 

Of the four multi-agency operations centers, three--AMOC, NTC and TSOC-
-have tactical yet different missions and provide different products 
that reflect their respective missions. The NOC-Watch has a more 
strategic mission in providing an overall assessment of situational 
awareness. 

Air and Marine Operations Center: 

The AMOC's primary mission is to detect, sort, track, and facilitate 
the interdiction of criminal entities throughout the Western 
Hemisphere, by utilizing integrated air and marine forces, the latest 
technology, and tactical intelligence. AMOC's maintains day-to-day, 
around-the-clock airspace situational awareness of the nation's borders 
through identification and detection of foreign and domestic threats. 
Created in 1988 by the U.S. Customs Service and located in Southern 
California, the AMOC was established as the Air and Marine Operations 
Center on March 1, 2003. In addition to CBP and U.S. Coast Guard 
personnel, the AMOC is staffed by the Federal Aviation Administration, 
and the Department of Defense National Guard Bureau-Air National Guard, 
as well as a representative of the government of Mexico. 

AMOC staff use surveillance systems and databases to detect, identify, 
and track potential threats, and to coordinate the apprehension of 
criminals using law enforcement air, marine, and ground interdiction 
forces. Staff utilize a surveillance system that includes an extensive 
network of over 200 ground-based radar and satellite tracking systems 
throughout North America and the Caribbean. Staff also use numerous law 
enforcement and Federal Aviation Administration databases to ensure 
that U.S. entry policy and procedures are followed. Figure 2 shows the 
variety of information and data sources employed by the AMOC. 

Figure 2: Air and Marine Operations Center Sources of Information and 
Data: 

[See PDF for image] 

Sources: From left to right, top to bottom: CBP, CBP, FAA, CBP, CBP, 
CBP, and CBP. 

[End of figure] 

Staff can conduct detailed research from a transnational and criminal 
threat perspective to identify suspect persons, aircraft, and marine 
vessels. AMOC staff use the resulting information to coordinate air and 
marine law enforcement activity with various agencies such as the U.S. 
Coast Guard and Immigration and Customs Enforcement; federal, state, 
and local law enforcement; the Department of Defense; U.S. and foreign 
air traffic control facilities; and foreign government coordination 
centers.[Footnote 16] The AMOC Daily Intelligence Report focuses on the 
nation's borders involving suspicious private air and marine craft that 
are detected by radar, eyewitnesses, or surveillance aircraft. 

National Targeting Center: 

The NTC's mission is to coordinate and support all agency field-level 
anti-terrorism activities by providing tactical targeting and 
analytical research, and to be a single point of reference for all 
agency anti-terrorism efforts. NTC monitors the movement of potential 
terrorists and prevents them and any weapons of terror from entering 
and exiting our country through land, air, and sea ports. Established 
on October 22, 2001, under the U.S. Customs Service, the NTC, located 
in Northern Virginia, began 24/7/365 operations November 10, 2001. In 
addition to CBP personnel, the NTC is staffed by the U.S. Coast Guard, 
Immigration and Customs Enforcement, Federal Air Marshal Service, and 
the Transportation Security Administration. 

NTC staff use sophisticated information-gathering techniques and 
analytical tools to look at data containing passenger and flight 
information. These data include lists of known terrorists, foreign 
visitors whose official authorization permitting entry into and travel 
within the United States has elapsed (visa overstays), passport 
information, and cargo listings to seek potential matches. Any 
inconsistency identified in the data can trigger additional analysis. 
Figure 3 shows the variety of sources of information and data sources 
employed by the NTC. 

Figure 3: National Targeting Center Sources of Information and Data at 
and between the Nation's Ports of Entry: 

[See PDF for image] 

Sources: Bottom right: Houston Airport System; all others: CBP. 

[End of figure] 

NTC works with a variety of federal stakeholders. For example, the NTC 
works with the Federal Bureau of Investigation's Terrorist Screening 
Center to identify persons on the National Terrorist Watch List. NTC 
staff also provide information from CBP's Advance Passenger Information 
System for TSA's performance of a risk assessment on crewmembers on 
international flights. Federal Air Marshals use information developed 
by the NTC to determine if they need to put resources on a specific 
flight. Using NTC capabilities to screen crew, vessel, and cargo, along 
with other information, the U.S. Coast Guard determines vessels and 
crewmembers that warrant further surveillance or assessment and can 
prioritize its inspection efforts. NTC also helps in implementing the 
pilot Immigration Advisory Program by reviewing advance information on 
travelers forwarded by program teams to identify travelers at foreign 
airports that may present a risk or warrant more intensive examination 
before they board aircraft bound for the United States. (Passengers 
whose travel documents are invalid, expired, or otherwise may have been 
altered, counterfeited or obtained through fraud are advised, as is the 
airline, before they leave their foreign location that they will likely 
be deemed inadmissible and denied entry upon arrival in the United 
States.) The NTC reports we reviewed primarily identified individuals 
at and between domestic ports of entry and certain critical foreign 
ports. 

Transportation Security Operations Center: 

The TSOC's mission is to provide situational awareness and information 
sharing in day-to-day coordination and incident management for all 
transportation security related operations and issues worldwide by 
monitoring, responding to, and investigating security incidents 
involving all transportation sectors. TSOC maintains situational 
awareness of passengers on commercial flights and works to minimize and 
mitigate security vulnerabilities of the National Capital Region and 
critical infrastructure such as commercial airports, rail stations, and 
pipelines. The TSOC, located in Northern Virginia, began 24/7/365 
operations in August 2003. The National Capital Region Command Center 
constitutes the multi-agency element of the TSOC because it is staffed 
by other DHS component agencies--specifically the U.S. Secret Service 
and Customs and Border Protection. In addition, representatives of 
organizations outside of DHS such as the Federal Bureau of 
Investigation, District of Columbia Metro Police, Federal Aviation 
Administration, U.S. Capitol Police, and the U.S. Air Force (Northeast 
Air Defense Sector) provide watchstanders for the TSOC. 

As part of its mission, TSOC staff coordinate with federal, state, and 
local homeland security entities to identify activities that might 
indicate a threat to national security and isolate indications of 
impending attack while assessing their potential impact. The TSOC also 
furnishes alerts and reports to field security organizations while 
combining intelligence with operational information across all modes of 
transportation. Last, it monitors incidents and crises, including 
national special events such as presidential inaugurations and the 
Super Bowl, for TSA headquarters and makes recommendations to DHS 
leadership. Figure 4 shows the modes of transportation monitored by the 
TSOC. 

Figure 4: Modes of Transportation Monitored by the Transportation 
Security Operations Center: 

[See PDF for image] 

Sources: From left to right, top tot bottom: GAO, PhotoDisc, CBP, TSA, 
GAO, PhotoDisc, and GAO. 

[End of figure] 

The TSOC reports we reviewed provided information on incidents across 
all modes of transportation, including National Capital Region security 
incidents, critical infrastructure, and individuals of interest related 
to the No-Fly List.[Footnote 17] 

National Operations Center-Interagency Watch: 

The NOC-Watch is designed to perform a more strategic mission than the 
other three multi-agency operations centers. NOC-Watch acts as the 
primary national-level coordination point for awareness of events that 
may affect national security or safety. The center is responsible for 
combining and sharing of information, communications, and operations 
coordination pertaining to the prevention of terrorist attacks and 
domestic incident management by facilitating information sharing with 
other federal, state, local, tribal, and nongovernmental entities and 
by fusing law enforcement, national intelligence, emergency response, 
and private-sector reporting. Created as the Homeland Security 
Operations Center and located in Northwest Washington, D.C., the center 
was established on February 19, 2003, and redesignated the National 
Operations Center on May 25, 2006. The NOC-Watch is the 24/7/365 
element of the center. In addition to staff from the Operations 
Directorate, the NOC-Watch includes other DHS staff from 20 components 
and offices such as representatives from the U.S. Secret Service, 
Federal Protective Service, Federal Air Marshal Service, Transportation 
Security Administration, Customs and Border Protection, U.S. Coast 
Guard, Federal Emergency Management Agency, U.S. Border Patrol, U.S. 
Citizenship and Immigration Services, National Biological Surveillance 
Group, U.S. Computer Emergency Readiness Team, Domestic Nuclear 
Detection Office, and other DHS directorates. The NOC-Watch also 
includes representatives from 35 other federal, state, and local 
agencies such as the Central Intelligence Agency; Defense Intelligence 
Agency; National Security Agency; National Geospatial-Intelligence 
Agency; Federal Bureau of Investigation; Department of Interior (U.S. 
Park Police); Drug Enforcement Administration; Alcohol, Tobacco, 
Firearms and Explosives; Virginia State Police; Fairfax County Police; 
and the New York, Boston, and Los Angeles police departments; and a 
number of other organizations. 

NOC-Watch staff use information gathered and communicated by the three 
tactical centers; other DHS operation centers; other federal, state, 
and local entities; and a wide variety of other information sources to 
provide overall national situational awareness related to homeland 
security. The NOC-Watch reports, via the DHS Director of Operations, to 
the Secretary of Homeland Security and coordinates directly with the 
White House and focuses on two goals: (1) the detection, prevention, 
and deterrence of terrorist attacks and (2) domestic incident 
management during crises and disasters or national special events. 
Figure 5 shows some of the sources of information and agencies with 
which that information is shared. 

Figure 5: National Operations Center-Interagency Watch Information and 
Data Sources: 

[See PDF for image] 

Sources: Logos from GAO, photo from DHS. 

[End of figure] 

Situation reports prepared by the Operations Directorate's NOC-Watch 
that we reviewed contained information reported from other DHS 
subcomponents and operations centers such as the TSOC, NTC, and AMOC, 
as well as external intelligence and law enforcement agencies, and the 
private sector. The NOC-Watch also prepares a Homeland Security 
Operations Morning Brief that provides information to federal, state, 
and local law enforcement agencies on the national picture at the 
sensitive but unclassified level. 

The Four Multi-Agency Operations Centers Share Common Functions and 
Customers: 

All four centers conduct common functions to maintain situational 
awareness and communicate and coordinate with other federal, state, and 
local governments, as well as private-sector entities. The centers do 
so to support both the mission of the sponsoring component organization 
and the underlying homeland security mission of DHS. On the basis of 
our discussions with center officials and our assessment of documents 
they provided, we summarized these functions and found that all DHS 
multi-agency operations centers perform 9 of 11 functions identified in 
table 2. (According to TSOC officials, the TSOC does not coordinate 
with foreign governments, and NTC and TSOC officials said they do not 
exercise command and control functions.) 

Table 2: Description of the Functions Performed by the Four DHS Multi- 
Agency Operations Centers: 

Functions: Situation awareness/information sharing and communications: 
Situation awareness/monitoring (all four centers); 
Description: The continual process of collecting, analyzing, and 
disseminating intelligence, information, and knowledge to allow 
organizations and individuals to anticipate requirements and to react 
effectively and to establish a common operational picture--a broad view 
of the overall situation as reflected by situation reports, aerial 
photography, and other information or intelligence. 

Functions: Situation awareness/information sharing and communications: 
Situation assessment/analysis (all four centers); 
Description: The evaluation and interpretation of information gathered 
from a variety of sources (including weather information and forecasts, 
computerized models, Geographic Information Systems data mapping, 
remote sensing sources, ground surveys, etc.) that, when communicated 
to emergency managers and decision makers, can provide a basis for 
incident management decision making. 

Functions: Situation awareness/information sharing and communications: 
Information dissemination and real-time communications (all four 
centers); 
Description: The process of providing information such as current 
threat-level information, announcements, reports, and urgent alerts to 
federal, state, local, tribal, and private-sector officials about 
possible terrorism activities[A] on a continuous basis. 

Functions: Coordination: Intradepartmental coordination (all four 
centers); 
Description: The sharing of information and operations with other DHS 
component agencies to synchronize activities and accomplish a 
collective task. 

Functions: Coordination: Other federal agency coordination and state, 
local, tribal coordination (all four centers); 
Description: The sharing of information, activities, and operations 
with federal, state, and local governments who have a shared 
responsibility in preparing for terrorist attacks as well as other 
disasters to accomplish a collective task. 

Functions: Coordination: Private-sector, nongovernment coordination 
(all four centers); 
Description: The sharing of information, activities, and operations 
with organizations and entities that are not part of any governmental 
structure to accomplish a collective task (e.g., for- profit and not-
for-profit organizations, formal and informal structures, commerce and 
industry, private emergency response organizations, and private 
voluntary organizations). 

Functions: Coordination: Foreign government coordination (NOC-Watch, 
NTC, and AMOC); 
Description: The sharing of information and operations with 
representatives of other foreign national governments to synchronize 
activities and accomplish a collective task. 

Functions: Incident management and decision-making: Incident management 
(all four centers); 
Description: The development of strategies and tactics and the 
ordering, coordination, and release of resources in response to an 
event, such as a terrorist attack or natural disaster. 

Functions: Incident management and decision-making: Decision-making 
support (all four centers); 
Description: The development of ideas, alternatives, or plans to aid 
decision makers in selection of a course of action, in responding to a 
new event or to make adjustments as an ongoing situation changes. 

Functions: Operational activities: Operational coordination; (all four 
centers); 
Description: The integrating or linking together of different 
organizational elements by synchronizing activities to accomplish a 
collective task. 

Functions: Operational activities: Operational command and control; 
(NOC-Watch and AMOC); 
Description: The exercise of authority and direction by a properly 
designated command organization over assigned forces or assets in the 
accomplishment of a specified mission. 

Source: GAO based on DHS information. 

[A] Section 892(f)(1) of the Homeland Security Information Sharing Act, 
Pub. L. No. 107-296, 116 Stat. 2252 (2002), defines homeland security 
information to include information possessed by a federal, state, or 
local agency that (A) relates to the threat of terrorist activity; (B) 
relates to the ability to prevent, interdict, or disrupt terrorist 
activity; (C) would improve the identification or investigation of a 
suspected terrorist or terrorist organization; or (D) would improve the 
response to a terrorist act. 

[End of table] 

Multi-agency operations centers' customers include federal, state, and 
local governments and private-sector entities, along with foreign 
governments. The NOC-Watch has a larger number of overall customers; as 
the national-level multi-agency hub for situational awareness and a 
common operating picture, the NOC-Watch provides information to a wider 
range of government customers, including federal executive leadership, 
and intelligence and law enforcement agencies at the federal, state, 
and local level. 

Opportunities Exist to Enhance Collaboration at DHS's Four Multi-Agency 
Operations Centers: 

DHS has leveraged its resources--one key collaborative practice--by 
having staff from multiple agencies work together at the four 
operations centers. However, opportunities exist to further implement 
this and the other relevant practices that our previous work has 
identified as important to enhancing and sustaining collaboration among 
federal agencies. For example, not all of the components responsible 
for managing the operation centers had: 

* established goals to define and articulate a common outcome and 
mutually reinforcing or joint strategies for collaboration (related to 
two of our key practices); 

* assessed staffing needs to leverage resources; 

* defined roles and responsibilities of watchstanders from agencies 
other than the managing one; 

* applied standards, policies, and procedures for DHS's information 
sharing network to provide a means to operate across agency boundaries; 

* prepared mechanisms to monitor, evaluate, and report on results of 
the operations centers to reinforce for collaborative efforts; and: 

* reinforced agency accountability for collaboration efforts through 
agency plans and reports. 

The Operations Directorate, established in November 2005 to improve 
operational efficiency and coordination, provides DHS with an 
opportunity to more consistently implement these practices that can 
enhance and sustain collaboration among federal agencies at multi- 
agency operations centers. 

The Four Multi-Agency Operations Centers Lack Documented Goals and 
Joint Strategies: 

The three DHS components responsible for the four multi-agency centers 
have not developed and documented common goals or joint strategies for 
their operation that our work has shown could enhance collaboration 
among the agencies. Officials at the four multi-agency operations 
centers we visited said they did consider formally documenting working 
agreements but concluded it was not essential since all of the agencies 
involved were part of DHS. Officials from the NOC said that the lack of 
formal agreements is a reflection of the speed with which the center 
was established and the inherent flexibility offered to DHS agencies in 
order to get them to staff the operation center positions. Nonetheless, 
as the DHS Office of Inspector General has reported, memorandums of 
understanding are valuable tools for establishing protocols for 
managing a national-level program between two organizations.[Footnote 
18] Within DHS, external and internal memorandums of agreement and 
other interagency joint operating plans are often used to document 
common organizational goals and how agencies will work together. For 
example: 

* The National Interdiction Command and Control Plan[Footnote 19] among 
the Department of Defense, Office of National Drug Control Policy, and 
the AMOC highlights an agreement between a DHS component and other 
federal agencies. 

* The Joint Field Office Activation and Operations Interagency 
Integrated Standard Operating Procedure[Footnote 20] describes how a 
temporary federal multi-agency coordination center should be 
established locally to facilitate field-level domestic incident 
management activities related to prevention, preparedness, response, 
and recovery and addresses the roles and responsibilities of multiple 
DHS components such as the Federal Emergency Management Agency and 
Immigration and Customs Enforcement and other federal agencies such as 
the Federal Bureau of Investigation. 

* Guidelines Governing Interaction Between ICE's Office of 
Investigations and CBP's Office of Border Patrol[Footnote 21] documents 
a memorandum of understanding between the Office of Investigations at 
Immigration and Customs Enforcement and CBP's Border Patrol, entered 
into in November 2004, that governs the interaction between the two 
components and formalizes roles and responsibilities in order to 
further enhance information sharing. 

Thus, although some DHS components have established a variety of 
internal and external working agreements, memorandums, and in the case 
of the Joint Field Offices, standard operating procedures, DHS's 
Operations Directorate, which is responsible for coordinating 
operations, has not provided guidance on how and when such agreements 
should be used to improve collaboration among the sponsoring and 
participating components at the operations centers we reviewed. Nor 
have any of these centers documented goals or joint strategies using 
these or other types of agreements. 

Our previous work has shown that memorandums of agreement or 
understanding and strategic plans can both be used to establish common 
goals and define joint strategies for how agencies will work together. 
According to our work, collaborative efforts are further enhanced when 
staff working across agency lines define and articulate a common 
federal outcome, or purpose, that is consistent with their respective 
agency goals and missions. Joint strategies or mutual agreements also 
contribute to another key area when they are used as a vehicle for 
identifying and defining more specific expectations of the roles and 
responsibilities of staff provided by collaborating agencies. 

The Four Multi-Agency Operations Centers Are at Varying Stages of 
Assessing Staffing Needs: 

The extent to which officials responsible for managing the four multi- 
agency operations centers had conducted needs assessments to determine 
the staffing requirements of each center varied. For example, CBP 
officials conducted an evaluation in June 2005 that addressed AMOC 
capabilities and continuing staffing needs related to AMOC personnel, 
but did not address the need for, or responsibilities of, U.S. Coast 
Guard staff at the center. AMOC officials did cite a requirement for 
additional staff from the U.S. Coast Guard, as well as a requirement 
for an Immigration and Customs Enforcement position in a subsequent 
strategic planning effort (although these requirements had not been 
filled). However, there was not a specific assessment supporting the 
need for these staff positions. NTC officials had not conducted a 
staffing needs assessment but said they plan to conduct an assessment 
based upon current targeting programs, the scheduled expansion of 
existing programs, and the onset of additional CBP targeting programs. 
They said they plan to include data on the volume of telephone calls 
handled by the center and the number of information requests completed 
by the NTC in support of CBP targeting and operations, and they expect 
to complete the assessment in October 2006. TSOC and NOC-Watch 
officials said they had not documented a needs analysis for staff from 
agencies other than the sponsoring agency. Instead, they viewed the 
cross-agency staffing requirement as a historical edict based on a 
general assumption that other agency staff expertise was needed to 
fulfill the mission of their operations center. 

Our work has shown that collaborating agencies should identify the 
resources, including human resources, needed to initiate or sustain 
their collaborative effort and take steps to leverage those resources. 
Because each agency, or component, has different strengths and 
limitations, assessing these varying levels allows them collectively to 
obtain additional resources otherwise unavailable individually. Formal 
assessment of the need for all participating agencies' staff to perform 
specific functions allows for the leveraging of resources to more 
effectively meet the operational needs of each agency or component. 

Three of the Four Multi-Agency Operations Centers Have Not Established 
a Definition of Watchstander Roles and Responsibilities for All 
Agencies at Each Center: 

While three of the four multi-agency operations centers had developed 
descriptions for the watchstander position staffed by their own agency, 
only one center--the AMOC--had developed a position description for 
staff assigned to the center from another DHS agency. At the AMOC, 
center officials require that Coast Guard staff meet a standardized set 
of requirements for radar watchstanders. The other centers relied on 
the components providing staff to define their watchstanders' roles and 
responsibilities. Lack of a consistent definition for the watchstander 
position may lead to people at the same center in the same role 
performing the same responsibilities differently or not at all. 

Our work has shown that defining roles and responsibilities both 
enhances and sustains collaboration among federal agencies. Because of 
the potentially critical, time-sensitive need for decisive action at 
24/7/365 operations centers, it is important that the roles and 
responsibilities of watchstanders are described and understood stood by 
both the staff and the officials responsible for managing the 
operations centers. Further, a definition of the watchstander role and 
responsibilities is important for supporting agency officials who must 
make staffing decisions about assigning qualified and knowledgeable 
personnel to the centers. Finally, internal controls standards[Footnote 
22] require that management and employees establish a positive control 
environment as a foundation for strong organizational internal 
controls. According to the standard, one activity that agency officials 
may consider implementing as part of the control environment is to 
identify, define, and provide formal, up-to-date job descriptions or 
other means of identifying and defining job-specific tasks. 

DHS Did Not Provide All Multi-Agency Operations Centers with Standards, 
Policies, and Procedures for Use of Its Information Sharing Network to 
Operate across Agency Boundaries: 

To collaborate by sharing information through DHS's primary information 
sharing system, the Homeland Security Information Network 
(HSIN),[Footnote 23] agencies participating in multi-agency operations 
centers need to be connected to the network and have the guidance that 
enables its use. In the course of our work, we learned that CBP's 
National Targeting Center could not collaborate with other users of 
HSIN because the system was not connected for NTC 
watchstanders.[Footnote 24] Other concerns about the use of HSIN to 
enhance coordination and collaboration have also been identified by the 
DHS Inspector General. According to the Inspector General, DHS did not 
provide adequate user guidance, including clear information sharing 
processes, training, and reference materials needed to effectively 
implement HSIN.[Footnote 25] The report noted that in the absence of 
clear DHS direction, users were unsure of how to use the system. Though 
DHS officials said other networks such as the Secret Internet Protocol 
Router Network and the Joint Worldwide Intelligence Communications 
System are primarily used for coordination of intelligence analysis, 
the connectivity problem with the primary DHS-wide information sharing 
system, HSIN, remained unresolved as of September 2006. 

Our work has shown that to facilitate collaboration, agencies need to 
address the compatibility of standards, policies, procedures, and data 
systems used in the collaborative effort. Furthermore, as agencies 
bring diverse cultures to the collaborative effort, it is important to 
address these differences to enable a cohesive working relationship and 
to create the mutual trust required to enhance and sustain the 
collaborative effort. Frequent communication among collaborating 
agencies is another means to facilitate working across agency 
boundaries and prevent misunderstanding. The lack of standards, 
policies, and procedures for use of HSIN at DHS operations centers 
could limit the frequency and effectiveness of communications among the 
centers. 

Three of Four Multi-Agency Operations Centers Have Not Developed 
Methods to Monitor, Evaluate, and Report Results of Joint Efforts: 

With the exception of AMOC, the multi-agency centers have not developed 
methods to monitor, evaluate, and report the results of joint efforts. 
For example, the Office of Management and Budget's assessment of the 
NOC-Watch for 2005 determined that center officials had not established 
effective annual or long-term performance goals.[Footnote 26] Nor were 
performance measures or other mechanisms in place to monitor and 
evaluate the joint efforts of multiple DHS agencies at the TSOC and 
NTC. In response to a report by the DHS Office of Inspector General in 
March 2004 that found the AMOC did not have organizational performance 
measures and individual performance standards to assess AMOC's 
effectiveness and productivity,[Footnote 27] AMOC officials reported to 
the Inspector General that they began collecting data in January 2004 
on a daily basis to measure productivity for the overall operations 
center as well as individual watchstanders, including U.S. Coast Guard 
representatives. 

Our work has shown that developing means to monitor, evaluate, and 
report areas of improvement allow agencies to enhance collaboration. 
Developing performance measures and mechanisms to monitor and evaluate 
the contributions can help management, key decision makers, and both 
stakeholders and customers obtain feedback through internal reports in 
order to improve operational effectiveness and policy. Developing goals 
and providing performance results can also help reinforce 
accountability through joint planning and reporting of collaborative 
efforts. 

The Four Multi-Agency Operations Centers Are at Various Stages of 
Reinforcing Accountability for Collaborative Efforts through Joint 
Agency Planning and Reporting: 

Neither DHS nor the component agencies responsible for managing the 
four multi-agency operations centers consistently discuss or include a 
description of the contribution of collaborative efforts of the multi- 
agency operations centers in their strategic or annual performance 
plans and reports. The most recent DHS strategic plan, issued in 2004, 
neither included a discussion of performance goals nor addressed the 
joint operations of the multi-agency centers. The plan reported only 
that DHS "will provide integrated logistical support to ensure a rapid 
and effective response and coordinate among Department of Homeland 
Security and other federal, state, and local operations centers 
consistent with national incident command protocols." CBP's 2005 annual 
report on the operations of the NTC does, however, include a section 
dedicated to the contributions of the external liaisons in describing 
the roles and responsibilities of other DHS agency personnel including 
the Federal Air Marshal Service, Immigration and Customs Enforcement, 
and the U.S. Coast Guard, and the accomplishments they have made in the 
center's operations. In addition, the AMOC strategic plan for 2005 
generally discussed the importance of collaboration with other 
component agencies and included a goal to strengthen component agency 
partnerships to maximize homeland security strategies. Reports of the 
components responsible for managing the other centers do not address 
the roles and contributions of other supporting agencies in 
accomplishing the centers' missions. DHS agencies responsible for 
providing staff to support watchstander positions for multi-agency 
operations centers managed by other agencies also do not address their 
participation in the operations of the operations center in strategic 
plans or performance reports. In general, managing and supporting 
agencies that do mention the operations centers do not include any 
discussion of the relationship between the participating agencies' 
missions or strategies and those of the centers. 

Our work has shown that federal agencies can use their strategic and 
annual performance plans as tools to drive collaboration with other 
agencies and partners and establish complementary goals and strategies 
for achieving results. These performance plans can also be used to 
ensure that goals are consistent and, if possible, mutually 
reinforcing. Accountability is also reinforced when strategic and 
annual performance plans help to align agency policy with collaborative 
goals. A public accounting through published strategic and annual 
performance plans and reports makes agencies answerable for 
collaboration. 

DHS's Operations Directorate Has an Opportunity to Help Ensure That Key 
Practices for Collaboration Are Implemented at the Multi-Agency 
Operations Centers: 

DHS established a new Office of Operations Coordination in November 
2005 (referred to as the Operations Directorate) to increase its 
ability to prepare for, prevent, and respond to terrorist attacks and 
other emergencies and improve coordination and efficiency of 
operations. In responding to a draft of this report, DHS cited a number 
of efforts that the new directorate plans to take to fulfill this 
leadership role. Among other things, DHS said it plans to conduct an 
independent study, initiated in September 2006, to leverage technical 
and analytical expertise to support expanding the capabilities of the 
Operations Directorate. In addition, DHS said it plans to move elements 
of the National Operations Center to the Transportation Security 
Operations Center in 2007 and, ultimately to colocate the DHS 
headquarters and all the DHS component headquarters along with their 
respective staffs and operations centers at one location. DHS also 
cited the development of a new working group that is developing a 
national command and coordination capability. While we agree that these 
leadership efforts proposed by the Operations Directorate could further 
enhance collaboration among DHS's component agencies, because DHS 
officials did not provide any information or documentation of these 
efforts in response to our requests during the course of the review, we 
were unable to determine the extent to which these efforts are likely 
to enhance and sustain departmental collaboration. Nonetheless, further 
departmental focus on the key practices we have identified could 
enhance collaboration among the component agencies. For example, at the 
time of our review, the directorate had not taken steps to gather 
information on the resources available at each center. The director's 
office did not have ready access to information such as centers' 
budgets or other financial information needed for reporting across the 
components, the number of staff employed at the multi-agency centers, 
or the number and type of operations centers managed by the various 
components. After being directed to the components for budget and 
staffing information, we found that the managing components of the 
multi-agency operations centers also did not have ready access to up- 
to-date information on the number of staff the centers employed. Such 
information could be useful to the directorate's efforts to develop a 
national command and coordination capability and further enhance 
collaboration among the components with multi-agency operations 
centers. Directorate officials said that the Operations Directorate had 
not assumed its full range of responsibilities due to not being fully 
staffed until March 2006 and because of the revisions to the National 
Response Plan formalized in May 2006.[Footnote 28] In responding to a 
draft of this report, DHS said that the Operations Directorate does not 
have the authority to direct or exercise control over other components' 
operations centers with respect to administration and support, 
including organization, staffing, control of resources and equipment, 
personnel management, logistics, and training. Nonetheless, while the 
Operations Directorate lacks authority to direct the actions of the 
other components' operations centers and obtaining compatible data may 
be difficult since the reporting systems of several centers were in 
place prior to the creation of DHS, without compatible staffing and 
financial data Operations Directorate leadership officials are hampered 
in their ability to understand and compare the relative personnel and 
operating costs of the 24/7/365 operations centers and use such 
information to promote the expected unity of effort within the 
department. 

Enhanced leadership from the Operations Directorate to support 
consistent reporting of operations centers' budgets and staffing could 
also support collaborative actions in two of the previously mentioned 
key areas: assessing staffing needs to leverage resources, and applying 
standards, policies, and procedures to operate across agency 
boundaries. In the absence of leadership to support these and other 
collaborative efforts, DHS officials have not yet taken full advantage 
of an opportunity to meet the directorate's responsibilities.[Footnote 
29] 

Conclusions: 

The establishment of the Operations Directorate with the express intent 
of enhancing collaboration and coordination among the department's 
operational components provides an opportunity to implement practices 
that could enhance collaboration among DHS agencies working together at 
each multi-agency 24/7/365 operations center. Having staff from 
multiple agencies work together is a way of leveraging resources, one 
key practice for enhancing collaboration. However, those resources may 
not be used to their full potential if other steps to enhance 
collaboration are not taken, and the Operations Directorate could 
provide guidance to help ensure that the sponsors of the operations 
centers take the appropriate steps. There are multi-agency operations 
centers that lack common goals and joint strategies; clearly defined 
roles and responsibilities; compatible standards, policies, and 
procedures for information networking; consistent staffing assessments; 
prepared mechanisms to monitor, evaluate, and report on the results of 
collaborative efforts; and reinforced agency accountability through 
agency plans and reports. Our previous work has shown that these are 
all critical components in enhancing collaboration among federal 
agencies. Given that the collaboration in multi-agency operations 
centers focuses on gathering and disseminating information on real-time 
situational awareness related to disasters and possible terrorist 
activity, it is important that the staff at the centers achieve the 
most effective collaboration possible. 

Recommendations for Executive Action: 

To provide a setting for more effective collaboration among the staff 
at each multi-agency 24/7/365 operations center, we recommend that the 
Secretary of the Department of Homeland Security charge the Director of 
the Operations Directorate with developing and providing guidance and 
helping to ensure the agencies that sponsor the centers take the 
following six actions: 

* define common goals and joint strategies; 

* clarify the roles and responsibilities for watchstanders; 

* implement compatible standards, policies, and procedures for using 
DHS's information network to provide a means of operating across agency 
boundaries; 

* conduct staffing needs assessments; 

* implement mechanisms to monitor, evaluate, and report on the results 
of collaborative efforts; and: 

* address collaborative efforts at the four multi-agency operations 
centers in plans and reports on the level of each operation center's 
managing agency. 

Agency Comments and Our Evaluation: 

On October 16, 2006, DHS provided written comments on a draft of this 
report (see app. III.) DHS agreed with the six recommended actions to 
enhance collaboration at the DHS multi-agency operations centers and 
said it planned to take action to implement the practices. In the draft 
report, we said that the Operations Directorate had not yet taken 
actions to fulfill its leadership role and that a lack of leadership by 
the Operations Directorate to support consistent reporting of 
operations centers' budgets and staffing limits collaborative actions. 
DHS did not agree that leadership provided by the Operation Directorate 
to support collaboration is lacking and provided a number of examples 
of leadership efforts. Among other things, DHS noted plans to conduct 
an independent study, initiated in September 2006, to leverage 
technical and analytical expertise to support expanding the 
capabilities of the Operations Directorate. In addition, DHS said it 
plans to move elements of the National Operations Center to the 
Transportation Security Operations Center in 2007 and, ultimately to 
colocate the DHS headquarters and all the DHS component headquarters 
along with their respective staffs and operations centers at one 
location. We identified the planned actions in the report and agree 
that these leadership efforts by the Operations Directorate have the 
potential to further enhance collaboration among DHS's component 
agencies, along with the key practices suggested by our efforts to 
review collaboration among agencies across the federal government. 
However, because Operations Directorate officials did not provide any 
information or documentation of these efforts in response to our 
requests during the course of the review, we were unable to determine 
the extent to which these efforts are likely to enhance and sustain 
departmental collaboration. 

In addition, DHS officials cited what they considered to be 
misconceptions expressed in the draft report. They said that the 
Operations Directorate does not have the administrative, budgetary, 
programmatic, or command and control authority to direct or exercise 
control over other component's operations centers. They also said that 
our draft incorrectly reported that the National Operations Center 
replaced the Homeland Security Operations Center. Although it was not 
our intent to imply that the Operations Directorate has administrative, 
budgetary, programmatic, or command and control authority to direct or 
exercise control over other component's operations centers, we added a 
clarifying reference to address DHS's concern. Finally, although we 
reported that the new National Operations Center includes (rather than 
replaced) the previous Homeland Security Operations Center, we also 
added a footnote to further clarify that the scope of responsibilities 
of the new National Operations Center is greater than that of the 
Homeland Security Operations Center. 

We are sending copies of this report to the Senate Committee on 
Homeland Security and Governmental Affairs, the Permanent Subcommittee 
on Investigations, the Secretary of Homeland Security; the Assistant 
Secretary of the Transportation Security Administration, the 
Commissioner of Customs and Border Protection, and interested 
congressional committees. We will also make copies available to others 
on request. In addition, the report will be available on GAO's Web site 
at [Hyperlink, http://www.gao.gov]. 

If you or your staff have any questions about this report, or wish to 
discuss the matter further, please contact me at (202) 512-8777 or 
Jonespl@gao.gov. Contact points for our Offices of Congressional 
Relations and Public Affairs may be found on the last page of this 
report. Key contributors to this report are listed in appendix IV. 

Signed by: 

Paul L. Jones: 
Director, Homeland Security and Justice Issues: 

[End of section] 

Appendix I: Missions of 24/7/365 DHS Centers Staffed by One DHS 
Component: 

DHS agency: Department of Homeland Security Headquarters (DHS); 
#: 1; 
Center: U.S.-Computer Emergency Readiness Team; 
Mission: To monitor cyber security, respond to incidents, and direct 
communications. 

DHS agency: Department of Homeland Security Headquarters (DHS); 
#: 2; 
Center: National Communications Center; 
Mission: To assist in the initiation, coordination, restoration, and 
reconstitution of national security and emergency preparedness 
telecommunications services or facilities under all conditions, crises, 
or emergencies. 

DHS agency: Transportation Security Administration (TSA); 
#: 3; 
Center: TSA Office of Intelligence; 
Mission: To provide warning and intelligence analysis to inform field 
operators, industry, and TSA leadership. 

DHS agency: Transportation Security Administration (TSA); 
#: 4; 
Center: Federal Air Marshal Service, Mission Operations Control Center; 
Mission: To provide support to for scheduling, law enforcement 
situations, crisis management, and safety and security-related matters. 

DHS agency: Customs and Border Protection (CBP); 
#: 5; 
Center: Situation Room; 
Mission: To provide information on significant incidents from field and 
sector offices, providing situational awareness to the Commissioner and 
senior CBP management. 

DHS agency: Customs and Border Protection (CBP); 
#: 6; 
Center: Caribbean Air Marine Operations Center (Regional Operations); 
Mission: To utilize integrated air and marine forces, technology, and 
tactical intelligence to detect, sort, track, and facilitate the 
interdiction of criminal entities throughout the Caribbean area. 

DHS agency: Customs and Border Protection (CBP); 
#: 7; 
Center: National Airspace Security Operations Center (Regional 
Operations); 
Mission: To utilize integrated air forces, technology, and tactical 
intelligence to maintain air domain awareness, and detect, sort, track, 
and facilitate the interception of intruder aircraft throughout the 
National Capital Region. 

DHS agency: Customs and Border Protection (CBP); 
#: 8; 
Center: National Law Enforcement Communications Center; 
Mission: To monitor radio communications among CBP personnel for 
officer safety purposes, and to coordinate tactical communications and 
analytical investigative support to various DHS and other law 
enforcement agencies to support homeland security. 

DHS agency: Immigration and Customs Enforcement (ICE); 
#: 9; 
Center: ICE Operations Center; 
Mission: To provide senior management with daily reports and 
coordination on all significant incidents, events, and matters that 
have an impact on the mission of ICE and DHS. 

DHS agency: Immigration and Customs Enforcement (ICE); 
#: 10; 
Center: ICE Intelligence Watch; 
Mission: To provide timely, effective classified intelligence support 
to ICE headquarters and field personnel by serving as a clearinghouse 
for the screening, evaluation, processing, exploitation, dissemination, 
and coordination of intelligence information. 

DHS agency: Immigration and Customs Enforcement (ICE); 
#: 11; 
Center: Law Enforcement Support Center; 
Mission: To provide timely immigration status and identification 
information to federal, state, and local law enforcement agencies on 
aliens suspected, arrested, or convicted of criminal activity. 

DHS agency: Immigration and Customs Enforcement (ICE); 
#: 12; 
Center: Federal Protective Service Mega-Center System (4 regional 
centers)[A]; 
Mission: To provide alarm monitoring and dispatch services to all 
federally owned and leased buildings. 

DHS agency: Federal Emergency Management Agency (FEMA); 
#: 13; 
Center: National Response Coordination Center; 
Mission: To maintain national situational awareness and to monitor 
emerging incidents or potential incidents with possible operational 
consequences (becomes multi-agency under incident surge conditions). 

DHS agency: Federal Emergency Management Agency (FEMA); 
#: 14; 
Center: FEMA Operations Center[B]; 
Mission: To facilitate, in coordination with the NOC, the distribution 
of warnings, alerts, and bulletins to the entire emergency management 
community using a variety of communications systems. 

DHS agency: Federal Emergency Management Agency (FEMA); 
#: 15; 
Center: Mobile Emergency Response Support Operations Centers (5 
regional centers); 
Mission: To serve as the emergency operations center for FEMA regions 
and associated state operations centers providing time-sensitive 
information flow affecting federal involvement and provide a deployed 
operations center platform using assigned mobile assets during all 
catastrophic events. 

DHS agency: United States Secret Service (USSS); 
#: 16; 
Center: Joint Operations Center; 
Mission: To provide command, control, communication, and monitoring for 
ensuring the security of the White House complex and surrounding 
grounds. 

DHS agency: United States Secret Service (USSS); 
#: 17; 
Center: Intelligence Division Duty Desk; 
Mission: To coordinate communications for the receipt, coordination, 
and dissemination of protective intelligence information and activities 
that require immediate action in support of protection assignments. 
Also provides "as needed" information and coordination support for the 
service. 

DHS agency: United States Coast Guard (USCG); 
#: 18; 
Center: U.S. Coast Guard Command Center; 
Mission: To gather, coordinate, and disseminate information as the 
direct representative of the Coast Guard Commandant and the National 
Response Center. Serves as the primary communications link of priority 
operational and administrative matters between USCG field units, 
District and Area Commanders, senior Coast Guard officials, DHS 
officials, the White House, other federal agencies, state and local 
officials, and foreign governments. 

DHS agency: United States Coast Guard (USCG); 
#: 19; 
Center: Intelligence Coordination Center (includes three 24/7/ 365 
watch locations with one, the Intel Plot, colocated at U.S. Coast Guard 
Command Center); 
Mission: To function as the national-level coordinator for collection, 
analysis, production, and dissemination of Coast Guard intelligence. 
Provides all-source, tailored, and integrated intelligence and 
intelligence services to DHS, Coast Guard, Commandant/ staff, 
intelligence community, combatant commanders, and other services and 
agencies; The Intel Plot provides predictive and comprehensive 
intelligence support to priority requirements of the Commandant and 
senior staff at Coast Guard headquarters. 

DHS agency: United States Coast Guard (USCG); 
#: 20; 
Center: National Response Center[C]; 
Mission: To serve as the single federal point of contact for all 
pollution incident reporting. Also serves as a communications center in 
receiving, evaluating, and relaying information to predesignated 
federal responders, and advises FEMA of potential major disaster 
situations. 

DHS agency: United States Coast Guard (USCG); 
#: 21; 
Center: Regional Command Centers (46)[D]; Area Command Centers (2); 
District Command Centers (9); Sector Command Centers (35); 
Mission:To serve as points of coordination at various organizational 
levels for operational command, control, communications, intelligence, 
and analysis. 

Source: GAO generated based on information from DHS. 

[A] According to a Federal Protective Service official, the service has 
expanded its mission parameters in recent years beyond physical 
protection, and has initiated programs to better identify 
vulnerabilities, threats, and response requirements for attacks by 
international or domestic terrorist individuals or groups. The official 
said that with the advent of the National Infrastructure Protection 
Plan, the service is applying a specialized intelligence capability to 
support its expanded role as national coordinator for enhancing the 
protection of all federal, state, and local government facilities that 
are determined to be nationally critical. 

[B] According to FEMA officials, the FEMA Operations Center serves as 
the alternate NOC. Should the NOC be rendered incapable of functioning 
for any reason, they said the FEMA Operations Center will assume 
critical NOC functions until the NOC is returned to normal operating 
status. 

[C] According to U.S. Coast Guard officials, the National Response 
Center is a joint effort cochaired by the U.S. Coast Guard and the 
Environmental Protection Agency that is housed at U.S. Coast Guard 
headquarters. 

[D] According to a U.S. oast Guard official, the Area and District 
Command Centers are also designated as International Rescue 
Coordination Centers, and all Sector Command Centers are also 
designated Rescue Sub-Centers in accordance with international 
convention. 

[End of table] 

[End of section] 

Appendix II: Objectives, Scope, and Methodology: 

Our overall objective was to assess the collaboration among the four 
multi-agency DHS operations centers. The key questions addressed were 
as follows: 

1. What are the missions, functions, and products of the multi-agency 
24/7/365 DHS operations centers and who are their customers? 

2. To what extent has DHS implemented key practices for enhancing and 
sustaining collaboration at these multi-agency centers? 

To answer our first objective, we obtained and reviewed information on 
the missions and functions of all 24/7/365 operations centers in DHS. 
We visited centers managed by the Operations Directorate, U.S. Customs 
and Border Protection, the Federal Emergency Management Agency, the 
Transportation Security Administration, the U.S. Coast Guard, and the 
Secret Service to observe their operations, interview officials 
responsible for managing the centers, and identify centers that 
employed staff from multiple DHS agencies. We identified four centers 
that employed staff from multiple DHS component agencies: the Air and 
Marine Operations Center, the National Targeting Center, the 
Transportation Security Operations Center, and the National Operations 
Center-Interagency Watch. We gathered and analyzed information 
regarding the products the multi-agency centers developed on a regular 
basis and the primary customers served by the centers. 

To answer our second objective, we met with responsible officials of 
the NOC-Watch and the acting Director of the Operations Directorate to 
discuss the roles and responsibilities of the new organization 
established as a result of the department's Second Stage Review. We 
discussed the transition, current operations, and policy and procedures 
put in place by the Operations Directorate since the reorganization. We 
also met with officials from TSA, USCG, CBP, ICE, and the Operations 
Directorate to discuss how staff are assigned by these agencies to the 
four multi-agency operations centers. We spoke with watchstanders 
assigned to several of the centers from other DHS component agencies to 
discuss their roles and responsibilities at the centers, and the 
overall mission of the centers to which they had been assigned. We 
reviewed planning and policy documents including DHS's strategic plans 
and performance and accountability reports as well as our prior 
reports[Footnote 30] and reports from DHS's Inspector General that 
addressed DHS management issues. For the four national operations 
centers we identified as multi-agency DHS centers, we also reviewed 
strategic plans, standard operating procedures, and annual reports and 
performance and accountability reports. We assessed DHS's efforts and 
actions taken by the Operations Directorate to encourage coordination 
among the multi-agency centers and to promote collaboration among the 
staff representing DHS agencies at the centers to determine the extent 
that they reflected consideration of key practices that our previous 
work has shown can enhance and sustain a collaborative relationship 
among federal agencies. Eight practices we identified to enhance and 
sustain collaboration are identified below: 

* defining and articulating a common outcome; 

* establishing mutually reinforcing or joint strategies; 

* identifying and addressing needs by leveraging resources; 

* agreeing on roles and responsibilities; 

* establishing compatible policies, procedures, and other means to 
operate across agency boundaries; 

* developing mechanisms to monitor, evaluate, and report on results; 

* reinforcing agency accountability for collaboration efforts through 
agency plans and reports; and, 

* reinforcing individual accountability for collaborative efforts 
through performance management systems. 

For the purposes of this review, we selected the first seven of the 
eight practices. We combined our discussion of the implementation of 
the first two practices--defining and articulating a common outcome and 
establishing mutually reinforcing or joint strategies. We did not 
address the eighth practice--reinforcing individual accountability for 
collaborative efforts through performance management systems--because 
an in-depth examination of component agencies' performance management 
systems was beyond the scope of this review. We selected examples that, 
in our best judgment, clearly illustrated and strongly supported the 
need for improvement in specific areas where the key practices could be 
implemented. 

We conducted our work from October 2005 through September 2006 in 
accordance with generally accepted government auditing standards. 

[End of section] 

Appendix III: Comments from the Department of Homeland Security: 

U.S. Department of Homeland Security: 
Washington, DC 20528: 

October 16. 2006: 

Mr. Paul L. Jones: 
Director: 
Homeland Security and Justice: 
U.S. Government Accountability Office: 
Washington, D. C. 20548: 

Dear Mr. Jones: 

Re: Draft Report GAO-07-89, Homeland Security Opportunities for 
Enhancing Collaboration at 24/7 Operations Centers Staffed by Multiple 
DHS Agencies. 

Thank you for the opportunity to review the draft report. DHS 
appreciates the GAO's efforts, insights, identification of improvement 
opportunities, and recommendations. 

Overview: 

In general, DHS agrees with the GAO's six recommended actions to 
enhance collaboration at the DHS multi-agency operations centers: 

(1) Define common goals and joint strategies. 

(2) Clarify the roles and responsibilities for watch-standers. 

(3) Implement compatible standards, policies, and procedures for using 
DHS's information network to provide a means of operating across agency 
boundaries. 

(4) Conduct staffing needs assessments. 

(5) Implement mechanisms to monitor, evaluate, and report on the 
results of collaborative efforts. 

(6) Address collaborative efforts at the multi-agency operations 
centers in plans and reports on the level of each operation center's 
managing agency. 

To that end, the Office of Operations Coordination (OPS) works to 
provide guidance aimed at improving collaboration among DHS components' 
operations centers. It is crucial, however, to recognize that OPS does 
not possess administrative, budgetary or operational control over the 
component's operations centers, which is implied in the text of the 
report: 

[OPS] "...had not yet taken actions to fulfill this leadership role... 
for example, by gathering information on the resources available at 
each center...did not have ready access to centers' budgets...other 
financial information needed for reporting across the components, the 
number of staff employed..." 

"The lack of leadership from the Operations Directorate to support 
consistent reporting of operations centers' budgets and staffing..." 

DHS respectfully disagrees with the report's implication that needed 
collaboration is tied to a lack of leadership in OPS. Although DHS's 
operations centers closely collaborate, centers are responsible for 
supporting the mission of their respective parent organization and are 
not designed to serve, or report to OPS. Nevertheless, the Office of 
Operations Coordination has strong working relationships with all 
operations centers in DHS, which has helped provide the situational 
awareness needed by DHS leadership to make critical decisions. This 
cooperation is enhanced through real-world events and exercises. In 
addition, OPS is driving a significant effort to improve collaboration 
by planning to collocate the National Operations Center (NOC) and 
Transportation Security Operations Center (TSOC). 

Progress: 

DHS recognizes that the Office of Operations Coordination has made many 
significant strides forward with regard to subject areas comprising the 
GAO's six recommendations, notwithstanding that OPS is a newly created 
DHS Component. Examples of such achievements are: 

(1) In addition to leading the effort to cascade the operations 
function throughout the Department (strategic, operational, and 
tactical levels), OPS has spearheaded the development and 
implementation of the following Homeland Security Council Katrina 
Report's tasks: 

* Establish a National Operations Center (NOC): 

* Establish National Information and Knowledge Management System: 

* Establish a National Reporting System: 

* Establish National Information Requirements and a National: 

* Information Reporting Chain: 

* Establish and Maintain Deployable Communications Capability: 

* Develop & Resource a Federal Planning and Execution System: 

* Establish a Permanent Planning/Operations Staff Housed within the 
NOC: 

(2) OPS established the National Operations Center (NOC), the Planning 
Element and a deployable communications capability. Also, OPS has 
developed a conceptual interagency planning process and continue to 
accomplish the above tasks in the context of the NRP scenarios via an 
incremental development process. OPS's initial focus has been on 
hurricane preparation, response and recovery. For hurricane scenarios, 
OPS identified the information requirements, worked through interagency 
roles and responsibilities, and implemented the following processes: 
reporting, resolution, information flow, information integrity, 
products (SPOTREPS, EXSUMS, SITREPS, COP/COD, POTUS Slides). OPS has 
developed the associated business process for the NOC and its 
interagency partners. OPS intent is to continue forward from natural 
disasters to terrorist events, so that it will accomplish the above 
tasks for all threats and all hazards. 

(3) Additionally, OPS is supporting a pioneering effort in the 
Directorate of Preparedness for a National Command and Coordination 
Capability. This effort is being developed via an interagency working 
group and it has produced the following: 

* Terms of Reference: 

* Strategic Concept: 

* Functional Requirements and Implementation Plan: 

* Plan of Action and Milestones: 

* 'To Be' Architectural Framework: 

The Way Ahead: 

A. Mission Blueprint Development and Implementation. In order to 
enhance the efficiency and effectiveness of OPS, an independent study 
was started in early September 2006. The intent is to leverage 
technical and analytical expertise to support expanding the 
capabilities of OPS (conceptual, procedural, technical) in a 
comprehensive and rapid manner. 

B. Operating Focus. Continue to focus on current operations, 
development of the NOC and the Planning Element capabilities, and 
providing a unified National operating capability in support of the NRP 
scenarios and the War on Terrorism. 

C. Implement GAO Key Practices. Continue overall efforts to develop 
improve and sustain relationships, functionality, processes, 
integration, collaboration, and documentation in order to enhance 
operational readiness and mission accomplishment. 

D. NOC Move to TSOC. Moving elements of the NOC to the TSA facility in 
Herndon, VA is scheduled for 2007. The move is intended to enhance the 
functionality, efficiency and effectiveness of the NOC. This is an 
interim step bridging the development of the DHS Campus. 

E. DHS Campus. Collocating the DHS headquarters and all the DHS 
Component headquarters along with their respective staffs and 
operations centers at one location. One idea has the NOC at the center 
of a `hub and spoke' configuration with a Component operations centers 
at each spoke. The Pentagon-like idea is intended to increase the 
efficiency and effectiveness of DHS operations. 

Sincerely, 

Signed by: 

Steven J. Pecinovsky: 
Director: 
Departmental GAO-OIG Liaison Office: 

Appendix 1: Misconceptions: 

There are three basic misconceptions that underlie this report: 

(1) That OPS has administrative control operations centers. While OPS 
does have administrative control over the NOC-Watch, it does not have 
the authority to direct or exercise control over Component/subordinate 
operations centers with respect to administration and support, 
including organization, staffing, control of resources and equipment, 
personnel management, logistics and training. 

(2) That OPS has command and control authority. There is no Secretary's 
Delegation of Authority for OPS to assume command and control over the 
Department's operations centers. OPS is a staff element and as such 
does not command. 

(3) That the NOC replaced the HSOC. 

a. The NOC did more than replace the HSOC, because it integrates the 
HSOC's "watch function" with other critical functions to include a new 
planning capability. The NOC has five components: The Watch, the Office 
of Intelligence and Analysis (OIA), the National Response Coordination 
Center (NRCC), the National Infrastructure Coordinating Center (NICC), 
and the Planning Element (PE). Each is responsible for distinct but 
complementary tasks toward accomplishing the overall DHS mission. 

b. The only DHS operations center that OPS administratively controls is 
the the NOC-Watch and planning element. Thus, the NOC operates as a 
matrix organization in order to accomplish its mission. The 
descriptions below provide a brief overview of the composition and 
roles of each NOC element. 

(1). The Watch is comprised of representatives from DHS components and 
agencies from Federal, State, and local departments and agencies, as 
required, supporting steady-state, 24/7, threat-monitoring requirements 
and domestic incident management activities. The organizational 
structure of The Watch is designed to integrate a full spectrum of 
interagency subject matter expertise and reach-back capability and 
planning to meet the demands of a wide range of potential incident 
scenarios. 

(2). In partnership with other elements of the NOC, the OIA is 
responsible for interagency intelligence collection, analysis, 
production, and product dissemination for DHS. To accomplish this 
function the OIA is integrated into the NOC and is critical to the 
"quick look" capability and "Indications & Warning" capability. 

(3). The NRCC is FEMA's operations center located in the FEMA 
Headquarters building, Washington, DC. The NRCC surges, from a small 
watch team who provide 24/7 coverage, by calling in Emergency Support 
Function (ESF) personnel as needed for incident coverage. There are 15 
ESFs and the NRCC provides overall Federal response coordination for 
the ESFs and the incidents. The NRCC monitors potential or developing 
incidents and supports the efforts of regional and field components. 

(4). The NICC belongs to Infrastructure Protection in the Preparedness 
Directorate and it is located in the TSA building, Herndon, VA. The 
NICC monitors the Nation's critical infrastructure and key resources on 
an ongoing basis and conducts daily polling of the standing information-
sharing entities for incidents and abnormalities. During an incident, 
the NICC provides mechanisms to share and assess information across 
infrastructure and key resources sectors through appropriate 
information-sharing entities. 

(5). The Planning Element supports crisis planning and the production 
and execution of national operational plans under a unified planning 
effort for domestic incidents that would require a Federal response. 
The PE will participate in the development of strategic guidance, 
concept development, plan development, and plan refinement leading to 
publication of a series of plans for potential homeland security 
events. 

[End of section] 

Appendix IV: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

Paul L. Jones (202) 512-8777: 

Acknowledgments: 

In addition to the contact named above, Christopher Keisling, Kathleen 
Ebert, Dorian Dunbar, Scott Behen, Keith Wandtke, Amanda Miller, 
Christine Davis, and Willie Commons III made key contributions to this 
report. Additional assistance was provided by Katherine Davis. 

FOOTNOTES 

[1] Pub. L. No. 107-296, 116 Stat. 2135. 

[2] Established in 2005, the Operations Directorate is a separate 
organization within DHS that is responsible for one 24/7/365 center and 
exists to improve operational efficiency and coordination across the 
department, among other things. 

[3] The six primary component agencies that conduct 24/7/365 operations 
are the Federal Emergency Management Agency, Transportation Security 
Administration, Customs and Border Protection, Immigration and Customs 
Enforcement, the U.S. Coast Guard, and the U.S. Secret Service; the 
U.S. Citizenship and Immigration Services does not have an operations 
center that conducts activities 24/7/365 days a year. 

[4] As defined for this report, the national centers conduct 
information gathering and/or analysis activities that cover the entire 
nation as opposed to a specific region or activities limited to alarm 
system monitoring or communications relays. For example, the U.S. Coast 
Guard has 46 command center locations at the area, district, and sector 
levels to serve as regional points of coordination for operational 
command and control, communications, and intelligence and analysis. 
Meanwhile, the Immigration and Customs Enforcement's Federal Protective 
Service Mega-Center System consists of four individual regional center 
locations that provide alarm monitoring to federally owned or leased 
buildings. We did not count these DHS regional centers with multiple 
locations more than once since they performed the same mission. As 
another example, the Federal Emergency Management Agency's Mobile 
Emergency Response Support Operations Centers are located in five 
regions that we counted as one center, for the purposes of our review. 

[5] GAO, High Risk Series: An Update, GAO-03-119 (Washington, D.C.: 
January 2003). 

[6] During incidents or emergencies, other operations centers may 
employ staff from multiple agencies. For example, the Coast Guard's 
regional command centers that normally focus on a variety of U.S. Coast 
Guard's missions and are not normally interagency in structure have 
established protocols with other DHS agencies, such as Customs and 
Border Protection and Immigration and Customs Enforcement, to activate 
a unified or incident command structure when needed. These U.S. Coast 
Guard centers have extra space and equipment that allow for surge 
capabilities and full coordination with each partner agency to host ad 
hoc interagency operations. 

[7] For the purpose of this report, we use the term "watchstander" to 
refer to an individual required to work full-time on a rotating 24-hour 
schedule, 7 days per week, to maintain situational awareness, conduct 
information assessment and threat monitoring to deter, detect, and 
prevent terrorist incidents. A watchstander may also act as a liaison 
between his agency and other agency representatives at the center, and 
may manage response to critical threats and incidents. 

[8] GAO, Results-Oriented Government: Practices That Can Help Enhance 
and Sustain Collaboration among Federal Agencies, GAO-06-15 
(Washington, D.C.: Oct. 21, 2005). 

[9] In addition, the NOC-Watch gathers information from other DHS 
operations centers, as well as a variety of other federal, state, and 
local government and law enforcement organizations. 

[10] DHS was initially created with 22 originating agencies and 
organizations. Shortly thereafter in June 2003, a 23rd organization, 
the Plum Island Animal Disease Center, was transferred into DHS from 
the U.S. Department of Agriculture. 

[11] According to DHS, the National Operations Center incorporates the 
24/7/365 Interagency Watch, the Office of Intelligence and Analysis, 
the Federal Emergency Management Agency's National Response 
Coordination Center, and an office called the Planning Element. The 
National Operations Center also shares responsibility for the National 
Infrastructure Coordination Center which is colocated and integrated as 
a watch function at the Transportation Security Operations Center. 

[12] GAO, Results-Oriented Cultures, Implementation Steps to Assist 
Mergers and Organizational Transformations, GAO-03-669 (Washington, 
D.C.: July 2, 2003). 

[13] Department of Homeland Security Office of Inspector General, 
Office of Audits, Major Management Challenges Facing The Department Of 
Homeland Security, DHS/OIG-05-06 (Washington, D.C.: December 2004). 

[14] GAO-06-15, 4. 

[15] In addition, the NOC-Watch gathers information from other DHS 
operations centers, as well as a variety of other federal, state, and 
local government and law enforcement organizations. 

[16] Foreign government coordination centers that partner with the Air 
and Marine Operations Center include the Royal Canadian Mounted Police, 
Joint Interagency Task Forces, Operation Bahamas Turks and Caicos, the 
U.S. Embassy Mexico's Intelligence Analysis Center, and the Canadian 
National Operations Center. 

[17] The No-Fly List is a list of individuals who are prohibited from 
boarding an aircraft. Originally created and maintained by TSA, the No- 
Fly List is the consolidated terrorist watch list maintained by the 
Federal Bureau of Investigation-administered Terrorist Screening 
Center. Both TSA and CBP use the No-Fly List for screening airline 
passengers. TSA is responsible for screening domestic airline 
passengers; CBP screens international passengers. CBP also uses this 
list to screen cruise line passengers. 

[18] Department of Homeland Security Office of Inspector General, 
Office of Inspections and Special Reviews, An Assessment of the 
Proposal to Merge Customs and Border Protection with Immigration and 
Customs Enforcement, OIG-06-04 (Washington, D.C.: Nov. 2005). 

[19] Office of National Drug Control Policy, National Interdiction 
Command and Control Plan, (Washington, D.C.: Sept. 20, 2005). 

[20] Department of Homeland Security, Joint Field Office Activation and 
Operations Interagency Integrated Standard Operating Procedure, version 
8.3 Interim Approval (Washington, D.C.: April 2006) i-ii. 

[21] As cited in DHS-OIG-06-04, 42. 

[22] GAO, Standards for Internal Control in the Federal Government, 
GAO/AIMD-00-21.3.1 (Washington, D.C. November 1999). 

[23] The HSIN is an unclassified, Web-based system that provides a 
secure, collaborative environment for real-time information sharing 
that includes reporting, graphics, and chat capabilities, as well as a 
document library that contains reports from multiple federal, state, 
local, and private-sector sources. HSIN supplies suspicious incident 
and pre-incident information, mapping and imagery tools, 24x7 
situational awareness, and analysis of terrorist threats, tactics, and 
weapons. 

[24] Other single agency operations centers such as the U.S. Coast 
Guard's Intelligence Coordination Center were also not fully connected. 
For example, U.S. Coast Guard officials told us that HSIN has never 
been widely used by analysts or watchstanders at their Intelligence 
Coordination Center due to technical and testing issues that made the 
system unavailable. We were also told that the Immigration and Customs 
Enforcement Operations Center had never been connected to HSIN due to 
technical problems. 

[25] Department of Homeland Security Office of Inspector General, 
Office of Information Technology, HSIN Could Support Information 
Sharing More Effectively, DHS/OIG-06-38 (Washington, D.C.: June 2006). 

[26] As reported on ExpectMore.gov found at [Hyperlink, 
http://www.whitehouse.gov/omb/expectmore/detail.10003615.2005.html]. 

[27] Department of Homeland Security Office of Inspector General, 
Office of Audits, AMOC Needs To Improve Written Guidelines For 
Providing Assistance To Other Agencies, DHS/OIG-04-20 (Washington, 
D.C.: March 2004). 

[28] Department of Homeland Security, Notice of Change to the National 
Response Plan Version 5.0, (Washington, D.C.: May 25, 2006). 

[29] Our work on mergers and transformations suggests that leadership 
within the department must set the direction, pace, and tone and 
provide a clear, consistent rationale that brings everyone together 
behind a single mission and establish integrated strategic goals to 
guide the transformation. Highlights Of A GAO Forum--Mergers and 
Transformation: Lessons Learned for a Department of Homeland Security 
and Other Federal Agencies, GAO-03-293SP (Washington, D.C.: Nov. 14, 
2002). 

[30] GAO, A Comprehensive and Sustained Approach Needed to Achieve 
Management Integration, GAO-05-139 (Washington, D.C.: March 2005); 
Practices That Can Help Enhance and Sustain Collaboration among Federal 
Agencies, GAO-06-15 (Washington, D.C.: Oct. 21, 2005). 

GAO's Mission: 

The Government Accountability Office, the investigative arm of 
Congress, exists to support Congress in meeting its constitutional 
responsibilities and to help improve the performance and accountability 
of the federal government for the American people. GAO examines the use 
of public funds; evaluates federal programs and policies; and provides 
analyses, recommendations, and other assistance to help Congress make 
informed oversight, policy, and funding decisions. GAO's commitment to 
good government is reflected in its core values of accountability, 
integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains 
abstracts and full-text files of current reports and testimony and an 
expanding archive of older products. The Web site features a search 
engine to help you locate documents using key words and phrases. You 
can print these documents in their entirety, including charts and other 
graphics. 

Each day, GAO issues a list of newly released reports, testimony, and 
correspondence. GAO posts this list, known as "Today's Reports," on its 
Web site daily. The list contains links to the full-text document 
files. To have GAO e-mail this list to you every afternoon, go to 
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order 
GAO Products" heading. 

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to: 

U.S. Government Accountability Office 

441 G Street NW, Room LM 

Washington, D.C. 20548: 

To order by Phone: 

Voice: (202) 512-6000: 

TDD: (202) 512-2537: 

Fax: (202) 512-6061: 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: www.gao.gov/fraudnet/fraudnet.htm 

E-mail: fraudnet@gao.gov 

Automated answering system: (800) 424-5454 or (202) 512-7470: 

Public Affairs: 

Jeff Nelligan, managing director, 

NelliganJ@gao.gov 

(202) 512-4800 

U.S. Government Accountability Office, 

441 G Street NW, Room 7149 

Washington, D.C. 20548: