This is the accessible text file for GAO report number GAO-08-352T 
entitled 'Personnel Clearances: Key Factors to Consider in Efforts to 
Reform Security Clearance Processes' which was released on February 27, 
2008.

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Testimony: 

Before the Subcommittee on Intelligence Community Management, Permanent 
Select Committee on Intelligence, House of Representatives: 

United States Government Accountability Office: 
GAO: 

For Release on Delivery Expected at 9:30 a.m. EST: 

Wednesday, February 27, 2008: 

Personnel Clearances: 

Key Factors to Consider in Efforts to Reform Security Clearance 
Processes: 

Statement of Brenda S. Farrell: 
Director, Defense Capabilities and Management: 

GAO-08-352T: 

GAO Highlights: 

Highlights of GAO-08-352T, a testimony before the Subcommittee on 
Intelligence Community Management, Permanent Select Committee on 
Intelligence, House of Representatives. 

Why GAO Did This Study: 

In 2004, Congress passed the Intelligence Reform and Terrorism 
Prevention Act to reform security clearance processes. Much of GAO’s 
experience in evaluating personnel security clearance processes over 
the decades has consisted of examining the Department of Defense’s 
(DOD) program, which maintains about 2.5 million clearances on 
servicemembers, DOD civilian employees, legislative branch employees, 
and industry personnel working for DOD and 23 other federal agencies. 
Long-standing delays in processing applications—and other problems in 
DOD’s clearance program—led GAO to designate it a high-risk area in 
2005. GAO also has documented clearance-related problems in other 
agencies. 

For this hearing, GAO was asked to identify key factors that could be 
applied in personnel security clearance reform efforts. To identify key 
factors, GAO drew upon its past reports and institutional knowledge. 
For those reports, GAO reviewed laws, executive orders, policies, 
reports, and other documentation related to the security clearance 
process; examined samples of cases of personnel granted top secret 
eligibility; compared documentation in those sampled cases against 
federal standards; and interviewed a range of cognizant government 
officials. 

What GAO Found: 

Current and future efforts to reform personnel security clearance 
processes should consider, among other things, the following four key 
factors: determining whether clearances are required for positions, 
incorporating quality control steps throughout the clearance processes, 
establishing metrics for assessing all aspects of clearance processes, 
and providing Congress with the long-term funding requirements of 
security clearance reform. Requesting a clearance for a position in 
which it will not be needed, or in which a lower-level clearance would 
be sufficient, will increase both costs and investigative workload 
unnecessarily. For example, changing the clearance needed for a 
position from a secret to top secret increases the investigative 
workload for that position about 20-fold and uses 10 times as many 
investigative staff hours. 

Emphasis on quality in clearance processes could promote positive 
outcomes, including more reciprocity among agencies in accepting each 
others’ clearances. Building quality throughout clearance processes is 
important, but government agencies have paid little attention to 
quality, despite GAO’s repeated suggestions to place more emphasis on 
quality. Even though GAO identified the government’s primary metric for 
assessing quality—the percentage of investigative reports returned for 
insufficiency during the adjudicative phase—as inadequate by itself in 
1999, the Office of Management and Budget and the Office of Personnel 
Management continue to use that metric. Concerns about the quality of 
investigative and adjudicative work underlie the continued reluctance 
of agencies to accept clearances issued by other agencies; as a result, 
government resources are used to conduct duplicative investigations and 
adjudications. 

Many efforts to monitor clearance processes emphasize measuring 
timeliness, but additional metrics could provide a fuller picture of 
clearance processes. The emphasis on timeliness is due in part to 
recent legislation that provides specific guidelines regarding the 
speed with which clearances should be completed and requires annual 
reporting of that information to Congress. GAO has highlighted a 
variety of metrics in its reports (e.g., completeness of investigative 
and adjudicative reports, staff’s and customers’ perceptions of the 
processes, and the adequacy of internal controls), all of which could 
add value in monitoring clearance processes and provide better 
information to allow improved oversight by Congress and the Executive 
Branch. 

Another factor to consider in reform efforts is providing Congress with 
the long-term funding requirements to implement changes to security 
clearance processes. DOD’s August 2007 congressionally mandated report 
on industry clearances identified its immediate funding needs but did 
not include information on the funding requirements for fiscal year 
2009 and beyond. The inclusion of less than 2 future years of budgeting 
data in the DOD report limits Congress’s ability to carry out its long-
term oversight and appropriations functions pertaining to industry 
personnel security clearances. 

To view the full product, click on [hyperlink, http://www.GAO-08-352T]. 
For more information, contact Brenda S. Farrell at (202) 512-3604 or 
farrellb@gao.gov. 

[End of section] 

Madam Chairwoman and Members of the Subcommittee: 

Thank you for the opportunity to be here today for this hearing on 
security clearance reform which is intended to cover efforts being 
undertaken to improve the process, impediments to those reforms, 
planned future steps, and possible changes in the strategy for 
improving clearance processing timeliness. Congress passed and the 
President signed into law the Intelligence Reform and Terrorism 
Prevention Act of 2004 (IRTPA) to mandate a variety of steps be taken 
to reform security clearance processes. 

One recent step taken to reform security clearance processes was the 
formation of an interagency security clearance process reform team in 
June 2007. Agencies included in this governmentwide effort are the 
Office of the Director of National Intelligence, the Department of 
Defense (DOD), the Office of Management and Budget (OMB), and the 
Office of Personnel Management (OPM). The team's memorandum of 
agreement indicates that it seeks to develop, in phases, a reformed DOD 
and intelligence community security clearance process that allows the 
granting of high-assurance security clearances in the least time 
possible and at the lowest reasonable cost. The team's July 25, 2007, 
terms of reference indicate that it plans to deliver "a transformed, 
modernized, fair, and reciprocal security clearance process that is 
universally applicable" to DOD, the intelligence community, and other 
U.S. government agencies, no later than December 31, 2008. 

Since 1974, we have been examining personnel security clearance 
processes on behalf of the Congress. Through scores of reports and 
testimonies, we have acquired broad institutional knowledge that gives 
us a historical view of key factors that should be considered in 
clearance reform efforts. See a list of our related GAO products at the 
end of this statement. My comments will focus on four key factors that 
should be considered in clearance reform efforts. Before offering 
observations on these factors, I would like to provide some background 
information on our prior work and recent government reform efforts. 

Our reports have documented a wide variety of problems present in DOD's 
clearance program. Some of the problems that we noted in our 2007 high- 
risk report included incomplete and delayed investigative reports from 
OPM, which supplies about 90 percent of all federal clearance 
investigations, and DOD adjudicators granting clearance eligibility 
even though data were missing from the investigative reports used to 
make such determinations. While some of those findings are now about 2 
years old, DOD's August 2007 congressionally-mandated report on 
clearance investigations for industry personnel[Footnote 1] noted 
continuing problems. For example, during the first 6 months of fiscal 
year 2007, the end-to-end processing of initial top secret clearances 
took an average of 276 days; renewal top secret clearances averaged 335 
days; and both initial and renewal secret clearances averaged 208 days. 
On the other hand, DOD's report also noted progress that the department 
had made to improve its industry clearance program, including 
submitting 100 percent of the clearance requests electronically to 
improve timeliness and reduce the number of rejected applications and 
conducting research in an effort to improve the accuracy of its 
projections for future industry clearance needs. 

Much of our experience in evaluating personnel security clearance 
processes over the decades has emphasized examinations of DOD's program 
that maintains approximately 2.5 million clearances on servicemembers, 
DOD civilian employees, industry personnel for DOD and 23 other federal 
agencies, and employees in the federal legislative branch. Long- 
standing delays in determining clearance eligibility and other 
clearance challenges led us to designate DOD's personnel security 
clearance program as a high-risk area in January 2005 and continue that 
designation in the updated list of high-risk areas that we published in 
2007.[Footnote 2] The areas on our high-risk list received their 
designations because they are major programs and operations that need 
urgent attention and transformation in order to ensure that our 
national government functions in the most economical, efficient, and 
effective manner possible. 

You asked that we identify key factors that should be considered in 
personnel security clearance reform efforts. As requested, my statement 
today will address four factors for your consideration based on our 
prior work. They are (1) having a sound requirements-determination 
process in place, (2) building quality into every step of the clearance 
processes, (3) having a valid set of metrics for evaluating efficiency 
and effectiveness, and (4) providing Congress with the long-term 
funding requirements of security clearance reform. My statement draws 
on our prior work on clearance processes, which included reviews of 
clearance-related documents and interviews of senior officials at DOD 
and OPM, which has the primary responsibility for providing 
investigation services to DOD. Our work was performed in accordance 
with generally accepted government auditing standards. Those standards 
require that we plan and perform the audit to obtain sufficient, 
appropriate evidence to provide a reasonable basis for our findings and 
conclusions, based on our audit objectives. We believe that the 
evidence we obtained provides a reasonable basis for our findings and 
conclusions based on our audit objectives. 

Summary: 

Determining whether clearances are required for positions, establishing 
quality control steps throughout the clearance processes, developing 
metrics for assessing all aspects of clearance processes, and providing 
Congress with the long-term funding requirements of security clearance 
reform are important factors to consider in current and future efforts 
to reform personnel security clearance processes. Developing a sound 
requirements process is important because requests for clearances for 
positions that do not need a clearance or need a lower level of 
clearance increase investigative workload and costs unnecessarily. For 
example, changing the clearance needed for a position from secret to 
top secret increases the investigative workload for that one position 
about 20-fold. That is, top secret clearances must be performed twice 
as often as secret clearances (every 5 years versus 10 years) and 
require 10 times as many investigative staff hours (about 60 versus 6). 

Emphasis on quality in all processes could promote positive outcomes 
such as greater reciprocity of clearances. The steps to build quality 
throughout clearance processes are important, but government agencies 
have paid little attention to this factor despite our repeated 
suggestions to place more emphasis on it and its measurement. Even 
though in 1999 we identified the government's primary metric for 
assessing quality--the percentage of investigations returned because of 
problems--as being inadequate by itself, OMB and OPM have continued to 
use that metric as late as February 2008. Concerns about the quality of 
investigative and adjudicative work underlie the continued reluctance 
of agencies to accept the clearances issued by other agencies, thus 
using government resources to conduct duplicative investigations and 
adjudications. 

Efforts to monitor clearance processes emphasize timeliness 
measurement, but additional metrics could provide a fuller picture of 
clearance processes. The emphasis on timeliness is partially due to 
recent legislation which provides specific guidelines regarding the 
speed with which clearances should be completed and requires annual 
reporting of that information to Congress. Still, our past reports on 
clearance processes have highlighted a wide variety of metrics (e.g., 
completeness of investigative and adjudicative reports, staff and 
customers' perceptions of the processes, and adequacy of internal 
controls) which could add value in monitoring clearance processes and 
supply better information for greater congressional oversight. 

Providing Congress with the long-term funding requirements to implement 
changes to security clearance processes could enable more informed 
congressional oversight. DOD's August 2007 congressionally mandated 
report on industry personnel security clearances identified its 
immediate needs by submitting a projected need of $178.2 million for 
fiscal year 2007 and a projected need of approximately $300 million for 
fiscal year 2008. However, the report did not include information on 
the funding requirements for fiscal year 2009 and beyond. The inclusion 
of less than 2 future years of budgeting information in the DOD report 
limits Congress's ability to carry out its long-term oversight and 
appropriations functions pertaining to industry personnel security 
clearances. 

Background: 

Although our high-risk designation covers only DOD's program, our 
reports have also documented clearance-related problems affecting other 
agencies. For example, our October 2007 report on state and local 
information fusion centers cited two clearance-related challenges: (1) 
the length of time needed for state and local officials to receive 
clearances from the Federal Bureau of Investigation (FBI) and the 
Department of Homeland Security (DHS) and (2) the reluctance of some 
federal agencies--particularly DHS and FBI--to accept clearances issued 
by other agencies (i.e., clearance reciprocity).[Footnote 3] Similarly, 
our April 2007[Footnote 4] testimony on maritime security and selected 
aspects of the Security and Accountability for Every Port Act (SAFE 
Port Act[Footnote 5]) identified the challenge of obtaining clearances 
so that port security stakeholders could share information through area 
committees or interagency operational centers. The SAFE Port Act 
includes a specific provision requiring the Secretary of Homeland 
Security to sponsor and expedite individuals participating in 
interagency operational centers in gaining or maintaining their 
security clearances. 

Our reports have offered findings and recommendations regarding current 
impediments, and they offer key factors to consider in future reforms. 
For example, as the interagency security clearance process reform team 
develops a new governmentwide end-to-end clearance system, this reform 
effort provides an opportune time to consider factors for evaluating 
intermediate steps and the final system in order to optimize efficiency 
and effectiveness. The Director of National Intelligence's July 25, 
2007, memorandum provided the terms of reference for the security 
clearance process reform team and noted that a future Phase IV would be 
used to perform and evaluate demonstrations and to finalize the 
acquisition strategy. 

In designing a new personnel security clearance system, the Government 
Performance and Results Act of 1993 (GPRA) may be a useful resource for 
the team designing the system and the congressional committees 
overseeing the design and implementation. GPRA provides a framework for 
strategic performance planning and reporting intended to improve 
federal program effectiveness and hold agencies accountable for 
achieving results. Agencies that effectively implement GPRA's results- 
oriented framework clearly establish performance goals for which they 
will be held accountable, measure progress towards those goals, 
determine strategies and resources to effectively accomplish the goals, 
use performance information to make the programmatic decisions 
necessary to improve performance, and formally communicate results in 
performance reports. Our reports have also identified a number of 
directly relevant factors, such as those found in our November 2005 
testimony that evaluated an earlier governmentwide plan for improving 
the personnel security clearance process.[Footnote 6] 

Four Key Factors Should Be Considered in Efforts to Reform Security 
Clearance Processes: 

I will address the need for consideration of four key factors in my 
testimony: (1) a strong requirements-determination process, (2) quality 
emphasis in all clearance processes, (3) additional metrics to provide 
a fuller picture of clearance processes, and (4) long-term funding 
requirements of security clearance reform. 

A Strong Requirements-Determination Process Can Help Manage Clearance 
Workloads and Costs: 

The interagency security clearance process reform team established in 
July 2007 might want to address whether the numbers and levels of 
clearances are appropriate since this initial stage in the clearance 
process can affect workloads and costs in other clearance processes. 
For instance, the team may want to examine existing policies and 
practices to see if they need to be updated or otherwise modified. We 
are not suggesting that the numbers and levels of clearances are or are 
not appropriate--only that any unnecessary requirements in this initial 
phase use government resources that can be utilized for other purposes 
such as building additional quality into other clearance processes or 
decreasing delays in clearance processing. 

Figure 1 highlights the fact that the clearance process begins with 
establishing whether an incumbent's position requires a clearance, and 
if so, at what level. The numbers of requests for initial and renewal 
clearances and the levels of such clearance requests (phase 2 in fig. 
1) are two ways to look at outcomes of requirements setting in the 
clearance process. 

Figure 1: Six Phases in the Personnel Security Clearance Process: 

[See PDF for image] 

This figure illustrates the six phases in the personnel security 
clearance process, as follows: 

1. Requirements Setting:
The agency determines if a position requires the incumbent to access 
classified information, and if so, the level of clearance needed. 

2. Application Submission: 
Potential or actual incumbent provides application materials, and 
security officer reviews and submits request for investigation. 

3. Investigation: 
OPM, another agency, or one of their contractors conducts an 
investigation and forwards an investigative report to an adjudication 
facility. 

4. Adjudication: 
On the basis of information in the investigative report, adjudicators 
determine eligibility to access classified information. 

5. Appeal: 
If a clearance is denied or revoked, potential or actual incumbent can 
appeal the adjudicative decision. 

6. Clearance Updating: 
If incumbent has long-term need to access classified information, 
clearance is updated: top secret, 5 years; secret, 10 years; and 
confidential, 15 years. 

Source: GAO analysis of DOD-provided information. 

[End of figure] 

In our prior work, DOD personnel, investigations contractors, and 
industry officials told us that the large number of requests for 
investigations could be attributed to many factors. For example, they 
ascribed the large number of requests to the heightened security 
concerns that resulted from the September 11, 2001, terrorist attacks. 
They also attributed the large number of investigations to an increase 
in the operations and deployments of military personnel and to the 
increasingly sensitive technology that military personnel, government 
employees, and contractors come in contact with as part of their jobs. 
While having a large number of cleared personnel can give the military 
services, agencies, and industry a great deal of flexibility when 
assigning personnel, the investigative and adjudicative workloads that 
are required to provide the clearances and flexibility further tax a 
clearance process that already experiences delays in determining 
clearance eligibility. 

A change in the level of clearances being requested also increases the 
investigative and adjudicative workloads. For example, in our February 
2004 report on impediments to eliminating clearance backlogs,[Footnote 
7] we found that a growing percentage of all DOD requests for 
clearances for industry personnel was at the top secret level: 17 
percent of those requests were at the top secret level in 1995 but 27 
percent were at the top secret level in 2003. This increase of 10 
percentage points in the proportion of investigations at the top secret 
level is important because top secret clearances must be renewed twice 
as often as secret clearances (i.e., every 5 years versus every 10 
years). In August 2006, OPM estimated that approximately 60 total staff 
hours are needed for each investigation for an initial top secret 
clearance and 6 total staff hours are needed for the investigation to 
support a secret or confidential clearance. The doubling of the 
frequency along with the increased effort to investigate and adjudicate 
each top secret reinvestigation adds costs and workload for the 
government. 

* Cost. For fiscal year 2008, OPM's standard billing rate is $3,711 for 
an investigation for an initial top secret clearance; $2,509 for an 
investigation to renew a top secret clearance, and $202 for an 
investigation for a secret clearance. The cost of getting and 
maintaining a top secret clearance for 10 years is approximately 30 
times greater than the cost of getting and maintaining a secret 
clearance for the same period. For example, an individual getting a top 
secret clearance for the first time and keeping the clearance for 10 
years would cost the government a total of $6,202 in current year 
dollars ($3,711 for the initial investigation and $2,509 for the 
reinvestigation after the first 5 years). In contrast, an individual 
receiving a secret clearance and maintaining it for 10 years would 
result in a total cost to the government of $202 ($202 for the initial 
clearance that is good for 10 years). 

* Time/Workload. The workload is also affected by the scope of coverage 
in the various types of investigations. Much of the information for a 
secret clearance is gathered through electronic files. The 
investigation for a top secret clearance, on the other hand, requires 
the information needed for the secret clearance as well as data 
gathered through time-consuming tasks such as interviews with the 
subject of the investigation request, references in the workplace, and 
neighbors. Since (1) the average investigative report for a top secret 
clearance takes about 10 times as many investigative staff hours as the 
average investigative report for a secret clearance and (2) the top 
secret clearance must be renewed twice as often as the secret, the 
investigative workload increases about 20-fold. Additionally, the 
adjudicative workload increases about 4-fold. In 2007, DOD officials 
estimated that it took about twice as long to review an investigative 
report for a top secret clearance, which would need to be done twice as 
often as the secret clearance. 

Unless the new system developed by the interagency security clearance 
process reform team includes a sound requirements process, workload and 
costs may be higher than necessary. 

Emphasis on Quality in All Processes Could Promote Positive Outcomes 
Such as Greater Clearance Reciprocity: 

Since the late 1990s, GAO has emphasized a need to build more quality 
and quality monitoring into clearance processes to achieve positive 
goals such as promoting greater reciprocity and maximizing the 
likelihood that individuals who are security risks will be scrutinized 
more closely. In our November 2005 testimony on the earlier 
governmentwide plan to improve the clearance process, we noted that the 
plan devoted little attention to monitoring and improving the quality 
of the personnel security clearance process, and that limited attention 
and reporting about quality continue. When OMB issued its February 2007 
Report of the Security Clearance Oversight Group Consistent with Title 
III of the Intelligence Reform and Terrorism Prevention Act of 2004, it 
documented quality with a single metric. Specifically, it stated that 
OPM has developed additional internal quality control processes to 
ensure that the quality of completed investigations continue to meet 
the national investigative standards. OMB added that, overall, less 
than 1 percent of all completed investigations are returned to OPM from 
the adjudicating agencies for quality deficiencies. When OMB issued its 
February 2008 Report of the Security Clearance Oversight Group, it did 
not discuss the percentage of completed investigations that are 
returned to OPM or the development or existence of any other metric 
measuring the level of quality in security clearance processes or 
products. 

As part of our September 2006 report,[Footnote 8] we examined a 
different aspect of quality--the completeness of documentation in 
investigative and adjudicative reports. We found that OPM provided 
incomplete investigative reports to DOD adjudicators, which the 
adjudicators then used to determine top secret clearance eligibility. 
Almost all (47 of 50) of the sampled investigative reports we reviewed 
were incomplete based on requirements in the federal investigative 
standards. In addition, DOD adjudicators granted clearance eligibility 
without requesting additional information for any of the incomplete 
investigative reports and did not document that they considered some 
adjudicative guidelines when adverse information was present in some 
reports. 

GAO has long reported that it is problematic to equate the quality of 
investigations with the percentage of investigations that are returned 
by requesting agencies due to incomplete case files. For example, in 
October 1999 and again in our November 2005 evaluation of the 
governmentwide plan, we stated that the number of investigations 
returned for rework is not by itself a valid indicator of quality 
because adjudication officials said they were reluctant to return 
incomplete investigations in anticipation of further delays.[Footnote 
9] We additionally suggested that regardless of whether this metric 
continues to be used, the government might want to consider adding 
other indicators of the quality of investigations, such as the number 
of counterintelligence leads generated from security clearance 
investigations and forwarded to relevant units. Further, our September 
2006 report recommended that OMB's Deputy Director of Management 
require OPM and DOD to (1) submit their procedures for eliminating the 
deficiencies that we identified in their investigative and adjudicative 
documentation and (2) develop and report metrics on completeness and 
other measures of quality that will address the effectiveness of the 
new procedures. We believe that our recommendation still has merit, but 
the previously cited passage from the February 2007 OMB report does not 
describe the new procedures or provide statistics for the recommended 
new quality measures and the 2008 OMB report is silent on quality 
measures. 

As we noted in September 2006, the government cannot afford to achieve 
its timeliness goal by providing investigative and adjudicative reports 
that are incomplete in key areas required by federal investigative 
standards and adjudicative guidelines. Incomplete investigations and 
adjudications undermine the government's efforts to move toward greater 
clearance reciprocity. An interagency working group, the Security 
Clearance Oversight Steering Committee,[Footnote 10] noted that 
agencies are reluctant to be accountable for poor quality 
investigations and/or adjudications conducted by other agencies or 
organizations. To achieve fuller reciprocity, clearance-granting 
agencies need to have confidence in the quality of the clearance 
process. Without full documentation of investigative actions, 
information obtained, and adjudicative decisions, agencies could 
continue to require duplicative investigations and adjudications. 
Earlier, we stated that reciprocity concerns continue to exist, citing 
FBI and DHS reluctance to accept clearances issued by other agencies 
when providing information to personnel in fusion centers. 

Government Clearance Metrics Emphasize Timeliness Measurement, but 
Additional Metrics Could Provide a Fuller Picture of Clearance 
Processes: 

Much of the recent quantitative information provided on clearances has 
dealt with how much time it takes for the end-to-end processing of 
clearances (and related measures such as the numbers of various types 
of investigative and adjudicative reports generated); however, there is 
less quantitative information on other aspects of the clearance 
process. In our November 2005 testimony, we noted that the earlier 
government plan to improve the clearance process provided many metrics 
to monitor the timeliness of clearances governmentwide, but that plan 
detailed few of the other elements that a comprehensive strategic plan 
might contain. A similar emphasis on timeliness appears to be emerging 
for the future governmentwide clearance process. In the Director of 
National Intelligence's 500 Day Plan for Integration and Collaboration 
issued on October 10, 2007, the core initiative to modernize the 
security clearance process had only one type of metric listed under the 
heading about how success will be gauged. Specifically, the plan calls 
for measuring whether "performance of IC [Intelligence Community] 
agency personnel security programs meet or exceed IRTPA guidelines for 
clearance case processing times." 

While the February 2007 and 2008 OMB reports to Congress contain 
statistics and other information in addition to timeliness metrics 
(e.g., use of information technology and reciprocity-related 
procedures) and the joint team developing the new clearance process may 
be considering a wider range of metrics than timeliness only, an 
underlying factor in the emphasis on timeliness is IRTPA. [Footnote 11] 
Among other things, IRTPA established specific timeliness guidelines to 
be phased in over 5 years. The Act also states that, in the initial 
period which ends in 2009, each authorized adjudicative agency shall 
make a determination on at least 80 percent of all applications for 
personnel security clearance within an average of 120 days after the 
receipt of the application for a security clearance by an authorized 
investigative agency. The 120-day average period shall include a period 
of not longer than 90 days to complete the investigative phase of the 
clearance review and a period of not longer than 30 days to complete 
the adjudicative phase of the clearance review. Moreover, IRTPA also 
includes a requirement for a designated agency (currently OMB) to 
provide information on among other things the timeliness in annual 
reports through 2011, as OMB did in February 2008. 

Prior GAO reports as well as inspector general reports identify a wide 
variety of methods and metrics that program evaluators have used to 
examine clearance processes and programs. For example our 1999 
report[Footnote 12] on security clearance investigations used multiple 
methods to examine numerous issues that included: 

* documentation missing from investigative reports; 

* the training of investigators (courses, course content, and number of 
trainees); 

* investigators' perceptions about the process; 

* customer perceptions about the investigations; and: 

* internal controls to protect against fraud, waste, abuse, and 
mismanagement. 

Including these and other types of metrics in regular monitoring of 
clearance processes could add value in current and future reform 
efforts as well as supply better information for greater congressional 
oversight. 

Long-Term Funding Requirements Information Could Enable More Informed 
Congressional Oversight of Security Clearance Reform: 

The joint Security Clearance Process Reform team may also want to 
consider providing Congress with the long-term funding requirements to 
implement changes to security clearance processes enabling more 
informed congressional oversight. In a recent report to Congress, DOD 
provided funding requirements information that described its immediate 
needs for its industry personnel security program, but it did not 
include information about the program's long-term funding needs. 
Specifically, DOD's August 2007 congressionally mandated report on 
clearances for industry personnel provided less than 2 years of data on 
funding requirements. In its report, DOD identified its immediate needs 
by submitting an annualized projected cost of $178.2 million for fiscal 
year 2007 and a projected funding need of approximately $300 million 
for fiscal year 2008. However, the report did not include information 
on (1) the funding requirements for fiscal year 2009 and beyond even 
though the survey used to develop the funding requirements asked 
contractors about their clearance needs through 2010 and (2) the tens 
of millions of dollars that the Defense Security Service Director 
testified before Congress in May 2007 were necessary to maintain the 
infrastructure supporting the industry personnel security clearance 
program. 

As noted in our February 2008 report, the inclusion of less than 2 
future years of budgeting information in the DOD report limits 
Congress's ability to carry out its oversight and appropriations 
functions pertaining to industry personnel security 
clearances.[Footnote 13] Without more information on DOD's longer-term 
funding requirements for industry personnel security clearances, 
Congress lacks the visibility it needs to fully assess appropriations 
requirements. In addition, the long-term funding requirements to 
implement changes to security clearance processes are also needed to 
enable the executive branch to compare and prioritize alternative 
proposals for reforming the clearance processes. As the joint Security 
Clearance Process Reform team considers changes to the current 
clearance processes, it may also want to consider ensuring that 
Congress is provided with the long-term funding requirements necessary 
to implement any such reforms. 

Concluding Observations: 

We were encouraged when OMB undertook the development of an earlier 
governmentwide plan for improving the personnel security clearance 
process and have documented in our prior reports both DOD and 
governmentwide progress in addressing clearance-related problems. 
Similarly, the current joint effort to develop a new governmentwide end-
to-end security clearance system represents a positive step to address 
past impediments and manage security clearance reform efforts. Still, 
much remains to be done before a new system can be designed and 
implemented. GAO's experience in evaluating DOD's and governmentwide 
clearance plans and programs as well as its experience monitoring large-
scale, complex acquisition programs could help Congress in its 
oversight, insight, and foresight regarding security clearance reform 
efforts. 

Madam Chairwoman and Members of the Subcommittee, this concludes my 
prepared statement. I would be happy to answer any questions you may 
have at this time. 

Contact and Acknowledgments: 

For further information regarding this testimony, please contact me at 
(202) 512-3604 or farrellb@gao.gov. Contact points for our Offices of 
Congressional Relations and Public Affairs may be found on the last 
page of this statement. Individuals who made key contributions to this 
testimony are Jack E. Edwards, Acting Director; James P. Klein, Joanne 
Landesman, Charles Perdue, Karen D. Thornton, and Stephen K. Woods. 

[End of section] 

Related GAO Products: 

DOD Personnel Clearances: Improved Annual Reporting Would Enable More 
Informed Congressional Oversight. GAO-08-350. Washington, D.C.: 
February 13, 2008. 

Homeland Security: Federal Efforts Are Helping to Alleviate Some 
Challenges Encountered by State and Local Information Fusion Centers. 
GAO-08-35. Washington, D.C.: October 30, 2007. 

Defense Business Transformation: A Full-time Chief Management Officer 
with a Term Appointment Is Needed at DOD to Maintain Continuity of 
Effort and Achieve Sustainable Success. GAO-08-132T. Washington, D.C.: 
October 16, 2007. 

DOD Personnel Clearances: Delays and Inadequate Documentation Found For 
Industry Personnel. GAO-07-842T. Washington, D.C.: May 17, 2007. 

Maritime Security: Observations on Selected Aspects of the SAFE Port 
Act. GAO-07-754T. Washington, D.C.: April 26, 2007. 

High-Risk Series: An Update, GAO-07-310 (Washington, D.C.: January 
2007). 

DOD Personnel Clearances: Additional OMB Actions Are Needed To Improve 
The Security Clearance Process, GAO-06-1070. Washington, D.C.: 
September 2006. 

Managing Sensitive Information: DOD Can More Effectively Reduce the 
Risk of Classification Errors, GAO-06-706. Washington, D.C.: June 30, 
2006. 

DOD Personnel Clearances: Questions and Answers for the Record 
Following the Second in a Series of Hearings on Fixing the Security 
Clearance Process. GAO-06-693R. Washington, D.C.: June 14, 2006. 

DOD Personnel Clearances: New Concerns Slow Processing of Clearances 
for Industry Personnel. GAO-06-748T. Washington, D.C.: May 17, 2006. 

DOD Personnel Clearances: Funding Challenges and Other Impediments Slow 
Clearances for Industry Personnel. GAO-06-747T. Washington, D.C.: May 
17, 2006. 

Questions for the Record Related to DOD's Personnel Security Clearance 
Program and the Government Plan for Improving the Clearance Process. 
GAO-06-323R. Washington, D.C.: January 17, 2006. 

DOD Personnel Clearances: Government Plan Addresses Some Long-standing 
Problems with DOD's Program, But Concerns Remain. GAO-06-233T. 
Washington, D.C.: November 9, 2005. 

Defense Management: Better Review Needed of Program Protection Issues 
Associated with Manufacturing Presidential Helicopters. GAO-06-71SU. 
Washington, D.C.: November 4, 2005. 

Questions for the Record Related to DOD's Personnel Security Clearance 
Program. GAO-05-988R. Washington, D.C.: August 19, 2005. 

Industrial Security: DOD Cannot Ensure Its Oversight of Contractors 
under Foreign Influence Is Sufficient. GAO-05-681. Washington, D.C.: 
July 15, 2005. 

DOD Personnel Clearances: Some Progress Has Been Made but Hurdles 
Remain to Overcome the Challenges That Led to GAO's High-Risk 
Designation. GAO-05-842T. Washington, D.C.: June 28, 2005. 

DOD's High-Risk Areas: Successful Business Transformation Requires 
Sound Strategic Planning and Sustained Leadership. GAO-05-520T. 
Washington, D.C.: April 13, 2005. 

High-Risk Series: An Update. GAO-05-207. Washington, D.C.: January 
2005. 

Intelligence Reform: Human Capital Considerations Critical to 9/11 
Commission's Proposed Reforms. GAO-04-1084T. Washington, D.C.: 
September 14, 2004. 

DOD Personnel Clearances: Additional Steps Can Be Taken to Reduce 
Backlogs and Delays in Determining Security Clearance Eligibility for 
Industry Personnel. GAO-04-632. Washington, D.C.: May 26, 2004. 

DOD Personnel Clearances: Preliminary Observations Related to Backlogs 
and Delays in Determining Security Clearance Eligibility for Industry 
Personnel. GAO-04-202T. Washington, D.C.: May 6, 2004. 

Industrial Security: DOD Cannot Provide Adequate Assurances That Its 
Oversight Ensures the Protection of Classified Information. GAO-04-332. 
Washington, D.C.: March 3, 2004. 

DOD Personnel Clearances: DOD Needs to Overcome Impediments to 
Eliminating Backlog and Determining Its Size. GAO-04-344. Washington, 
D.C.: February 9, 2004. 

[End of section] 

Footnotes: 

[1] DOD, Annual Report to Congress on Personnel Security Investigations 
for Industry and the National Industrial Security Program (August 
2007). This first of a series of annual reports was mandated by The 
John Warner National Defense Authorization Act for Fiscal Year 2007, 
Pub. L. No. 109-364, §347 (2006). 

[2] GAO, High-Risk Series: An Update, GAO-05-207 (Washington, D.C.: 
January 2005); and GAO, High-Risk Series: An Update, GAO-07-310 
(Washington, D.C.: January 2007). 

[3] GAO, Homeland Security: Federal Efforts Are Helping to Alleviate 
Some Challenges Encountered by State and Local Information Fusion 
Centers, GAO-08-35 (Washington, D.C.: Oct. 30, 2007). This report 
indicated that according to the 9/11 Commission, a breakdown in 
information sharing was a major factor contributing to the failure to 
prevent the attacks of September 11, 2001. Since then most states and 
some local governments have, largely on their own initiative, 
established fusion centers to address gaps in homeland security, 
terrorism, and law enforcement information sharing by the federal 
government and to provide a conduit of this information within the 
state. 

[4] GAO, Maritime Security: Observations on Selected Aspects of the 
SAFE Port Act, GAO-07-754T (Washington, D.C.: Apr. 26, 2007). 

[5] Pub. L. No. 109-347, 120 Stat. 1184 (2006). 

[6] GAO, DOD Personnel Clearances: Government Plan Addresses Some Long- 
standing Problems with DOD's Program, But Concerns Remain, GAO-06-233T 
(Washington, D.C.: Nov. 9, 2005). 

[7] GAO, DOD Personnel Clearances: DOD Needs to Overcome Impediments to 
Eliminating Backlog and Determining Its Size, GAO-04-344 (Washington, 
D.C.: Feb. 9, 2004). 

[8] GAO, DOD Personnel Clearances: Additional OMB Actions Are Needed to 
Improve the Security Clearance Process, GAO-06-1070 (Washington, D.C.: 
Sept. 28, 2006). 

[9] GAO-06-233T; and GAO, DOD Personnel: Inadequate Personnel Security 
Investigations Pose National Security Risks, GAO/NSIAD-00-12 
(Washington, D.C.: Oct. 27, 1999). 

[10] At that time, the committee was led by OMB's Deputy Director for 
Management and was composed of representatives from DOD, Homeland 
Security, Energy, Justice, Transportation, Commerce, State, the 
Director of National Intelligence, the National Security Council, and 
the National Archives and Records Administration. 

[11] Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 
No. 108-458, §3001 (g) Reduction of Length of Personnel Security 
Clearance Process (2004). 

[12] GAO, DOD Personnel: Inadequate Personnel Security Investigations 
Pose National Security Risks, GAO/NSIAD-00-12 (Washington, D.C.: Oct. 
27, 1999). 

[13] GAO, DOD Personnel Clearances: Improved Annual Reporting Would 
Enable More Informed Congressional Oversight, GAO-08-350 (Washington, 
D.C.: Feb. 13, 2008). 

[End of section] 

GAO's Mission: 

The Government Accountability Office, the audit, evaluation and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the performance 
and accountability of the federal government for the American people. 
GAO examines the use of public funds; evaluates federal programs and 
policies; and provides analyses, recommendations, and other assistance 
to help Congress make informed oversight, policy, and funding 
decisions. GAO's commitment to good government is reflected in its core 
values of accountability, integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each 
weekday, GAO posts newly released reports, testimony, and 
correspondence on its Web site. To have GAO e-mail you a list of newly 
posted products every afternoon, go to [hyperlink, http://www.gao.gov] 
and select "Subscribe to Updates." 

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to: 

U.S. Government Accountability Office: 
441 G Street NW, Room LM: 
Washington, D.C. 20548: 

To order by Phone: 
Voice: (202) 512-6000: 
TDD: (202) 512-2537: 
Fax: (202) 512-6061: 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: 
E-mail: fraudnet@gao.gov: 
Automated answering system: (800) 424-5454 or (202) 512-7470: 

Congressional Relations: 

Ralph Dawn, Managing Director, dawnr@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, D.C. 20548: 

Public Affairs: 

Chuck Young, Managing Director, youngc1@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, D.C. 20548: