This is the accessible text file for GAO report number GAO-08-488T entitled 'Homeland Security: DHS Improved its Risk-Based Grant Programs' Allocation and Management Methods, But Measuring Programs' Impact on National Capabilities Remains a Challenge' which was released on March 11, 2008. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Testimony Before the Subcommittee on Homeland Security, Committee on Appropriations, House of Representatives: United States Government Accountability Office: GAO: For Release on Delivery Expected at 2:00 p.m. EDT: Tuesday, March 11, 2008: Homeland Security: DHS Improved its Risk-Based Grant Programs' Allocation and Management Methods, But Measuring Programs' Impact on National Capabilities Remains a Challenge: Statement of William O. Jenkins, Jr., Director: Homeland Security and Justice Issues: GAO-08-488T: GAO Highlights: Highlights of GAO-08-488T, a testimony before the Subcommittee on Homeland Security, Committee on Appropriations, House of Representatives. Why GAO Did This Study: Since 2002, the Department of Homeland Security (DHS) has distributed over $19 billion in homeland security grants to enhance the nation’s preparedness and response capabilities. The Federal Emergency Management Agency (FEMA) is responsible for all preparedness efforts including allocating and managing these grants. This testimony examines (1) the process and methods to allocate homeland security grants to state and local governments, (2) how DHS communicates with states and localities in making grant allocation decisions, (3) what challenges affect the expeditious spending of DHS grant funds by states and localities; and (4) the extent that DHS measured program outcomes as part of its efforts to monitor the expenditure of grant dollars. GAO’s testimony is based on products issued from April 2005 through July 2007 on DHS’s grant management system, and on GAO’s ongoing mandated work related to FEMA’s risk-based grant distribution processes for fiscal years 2007 and 2008. To conduct this work, GAO reviewed relevant documents on FEMA’s risk analysis model and interviewed agency officials. What GAO Found: DHS uses an evolving risk-based methodology to identify the urban areas eligible for homeland security grants and the amount of funds states and urban areas receive. DHS designed the methodology to measure the relative risk of a given state or urban area using a risk analysis model that defined Risk as the product of Threat times Vulnerability and Consequences (R = T * (V & C)). Given the uncertainties inherent in risk assessment, the methodology uses a combination of empirical data (e.g., population, asset location) and policy judgment (e.g., the nature of the threat for specific areas and the weights to be assigned to specific variables in the model such as critical infrastructure, population, and population density). According to FEMA officials and GAO’s review of homeland security grant assistance documents, FEMA communicates with its state and local stakeholders by (1) providing individual threat assessments that DHS is using for its risk analysis model to each state and urban area, (2) validating the nonpublic national infrastructure data that are also part of the risk analysis model, (3) reviewing states’ and urban areas’ draft investment proposals that are later submitted and rated during DHS’s effectiveness assessment process, (4) providing technical assistance as states and urban areas prepare grant applications, and (5) holding post-award conferences to solicit stakeholder feedback. In April 2005, GAO reported that the ability of states and localities to spend grant funds expeditiously was complicated by the need to fulfill legal and procurement requirements, which in some cases added months to the purchasing process. GAO also reported a variety of steps that had been taken by states, DHS, and the Congress to streamline the expenditure of grant funds. However, GAO was unable to examine trends in obligations and expenditures for grant programs across fiscal years because the budget data FEMA provided did not specify grant expenditures by fiscal year and reporting categories were not consistent across fiscal years. Although DHS has taken some steps to establish goals, gather information, and measure progress, its monitoring of homeland security grant expenditures does not provide a means to measure the achievement of desired program outcomes. FEMA’s current efforts do not provide information on the effectiveness of those funds in improving the nation’s capabilities or reducing risk. DHS leadership has identified this issue as a high priority, and is trying to develop a more quantitative approach to accomplish the goal of using this information for the more strategic purpose of monitoring the achievement of program goals, according to FEMA officials. What GAO Recommends: GAO has made recommendations to DHS in prior reports to measure emergency response capabilities and improve grant allocation decisions. DHS generally concurred with these recommendations and is making progress implementing them. To view the full product, including the scope and methodology, click on [hyperlink, http://www.GAO-08-488T]. For more information, contact William O. Jenkins, Jr. at (202) 512-8777 or jenkinswo@gao.gov. [End of section] Mr. Chairman and Members of the Subcommittee: Thank you for the opportunity to discuss the allocation and use of federal grants to enhance the nation's preparedness for and response to major and catastrophic disasters. The goal of disaster preparedness and response is easy to state but difficult to achieve and can be stated as follows: To prevent where possible, prepare for, mitigate, and respond to disasters of any size or cause with well-planned, well-coordinated, and effective actions that minimize the loss of life and property and set the stage for a quick recovery. Achieving this goal for major and catastrophic disasters is a difficult task. It takes hard work, attention to details, and effective pre-and post-disaster coordination and cooperation among different levels of government, nongovernmental organizations, and the private sector. Individuals can also contribute to success through such things as knowing evacuation routes, complying with evacuation orders, and having a family and individual disaster preparation plan and supplies. Homeland security grants are the federal government's primary tool for enhancing state, local, and tribal governments' emergency preparedness and response capabilities. Since 2002, the Department of Homeland Security (DHS) has distributed over $19 billion in federal funding for planning, equipment, and training to enhance the nation's capabilities to respond to terrorist attacks and, to a lesser extent, natural and accidental disasters.[Footnote 1] The Post-Katrina Emergency Management Reform Act places responsibility for allocating and managing DHS grants with the Federal Emergency Management Agency (FEMA).[Footnote 2] Prior to the act, the organization within DHS principally responsible for administering such grants had no operational responsibilities for disaster response. The act also includes provisions to strengthen FEMA's organizational capacity to coordinate with states and localities in preparing for and responding to major and catastrophic disasters regardless of cause by consolidating federal emergency preparedness and response responsibilities and authorities within FEMA. Now that FEMA has the consolidated responsibilities and associated authorities for national emergency preparedness, the agency has a unique opportunity to evaluate how it can most effectively target the grants by viewing the grant programs collectively, rather than only in terms of the individual programs' objectives. My statement describes GAO's past work as well as ongoing work on DHS's grant management system, specifically, the grant management efforts that are now the responsibility of FEMA and addresses the following questions: (1) What methods does DHS use to allocate homeland security grants to state and local governments? (2) How does DHS communicate with states and localities in making federal grant allocation decisions? (3) What are the challenges that affect the expeditious spending of DHS grant funds by states and localities? (4) To what extent does DHS measure program outcomes as part of its efforts to monitor the expenditure of grant dollars? My comments are based on GAO's historical body of work on DHS grants management, including prior reviews of DHS's (1) risk management efforts,[Footnote 3] (2) methodology for allocating Urban Area Security Initiative (UASI) grants for fiscal years 2006 and 2007,[Footnote 4] (3) processes for managing their state homeland security[Footnote 5] and transportation sector-specific grants,[Footnote 6] and (4) preparedness for disasters, including FEMA's reorganization based on the Post-Katrina Reform Act.[Footnote 7] In addition, my comments are based on our ongoing mandated work examining the risk-based grant distribution processes used by FEMA to distribute the fiscal year 2008 Homeland Security Grant Program (HSGP). This program includes the UASI grants as well as the State Homeland Security Program (SHSP) which provides funding for state, local, and tribal governments. For our ongoing work, we analyzed DHS documents including the fiscal years 2007 and 2008 risk analysis models, grant guidance, and presentations, and interviewed DHS officials about the HSGP grant determination process in fiscal year 2007 as well as any changes to the fiscal year 2008 process. We conducted this work according to generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Summary: For fiscal years 2005 through 2008, DHS has used an evolving risk-based methodology to identify the urban areas eligible for HSGP grants and the amount of funds states and urban areas receive.[Footnote 8] DHS designed the methodology to measure the relative risk of a given state or urban area using a risk analysis model based on information about each state and urban area. Initially, this relative risk measurement relied primarily on information related to population and population density, but the data DHS included in the model and how DHS used those data to measure relative risk have evolved with each year's risk assessment. Since fiscal year 2006, DHS has adopted a more sophisticated risk-based grant allocation approach to (1) determine both states and urban areas' potential risk relative to other areas that includes empirical analytical methods and policy judgments, and (2) assess and score the effectiveness of the proposed investments submitted by the eligible applicants and determine the final amount of funds awarded. For the HSGP allocation process in fiscal year 2007, DHS defined Risk as the product of Threat times Vulnerability and Consequences (R= T* (V & C)).[Footnote 9] Our ongoing work has shown that DHS has defined risk in the same manner for fiscal year 2008. According to FEMA officials and HSGP grant assistance documents, FEMA communicates with its state and local stakeholders by (1) providing to each state and urban area the individual threat assessments DHS is using for its risk analysis model, (2) validating the nonpublic national infrastructure data that are also part of the risk analysis model, (3) reviewing states' and urban areas' draft investment proposals that are later submitted and rated during DHS's effectiveness assessment process, (4) providing technical assistance as states and urban areas prepare grant applications, and (5) holding post-award conferences to solicit stakeholder feedback. We reported in April 2005 that the ability of states and localities to spend grant funds expeditiously was complicated by the need to fulfill these state and local legal and procurement requirements, which in some cases added months to the purchasing process. For example, once grant funds are awarded to the states and then subgranted to the local jurisdictions or urban areas, certain legal and procurement requirements may have to be met, such as a city council's approval to accept grant awards. Or, if the state legislature must approve how the grant funds will be expended and is not in session when the grant funds are awarded, it could take as long as 4 months to obtain state approval to spend the funds. We also reported a variety of steps that had been taken by states, DHS, and the Congress to streamline the expenditure of grant funds such as some states establishing centralized purchasing systems and the Congress passing a provision that exempted some homeland security grant programs from requirements in the Cash Management Improvement Act so that grantees could receive grant funds in advance of the time that funds were needed to liquidate obligations (e.g., pay for goods and services received). DHS has obligated about $20 billion in grants for emergency preparedness and response from fiscal years 2002 through 2007, about $7 billion was unexpended as of January 2008. Because of inconsistencies in DHS's reporting of grant expenditures over time, we are unable to analyze expenditure trends by grant and fiscal year to determine if funds are now being spent more quickly. DHS has taken steps to establish goals, gather information, and measure progress, yet its monitoring of grant expenditures does not provide a means to measure the achievement of desired program outcomes to strengthen the nation's homeland security capabilities. We still know little about how states have used federal funds to build their capabilities or reduce risks. This is because neither FEMA nor its predecessor for grant management (from fiscal years 2003 through 2007) has yet developed a system to compile grant information in a manner that allows for effective analysis of the obligation, expenditure, and use of homeland security grants funds. For example, FEMA officials said that they currently rely on the grant monitoring process to assess the extent that states and urban areas are building capabilities. However, these efforts do not provide information on how states and localities finance their efforts in this area, how federal funds have been used, the extent to which federal funds supplement or supplant ongoing state and local expenditures, and the effectiveness of those funds in improving the nation's capabilities or reducing risk. According to FEMA officials, DHS leadership has identified this issue as a high priority, and is trying to come up with a more quantitative approach to accomplish the goal of using this information for the more strategic purpose of monitoring the achievement of program goals. Background: Risk management has been endorsed by the Congress, the President, and Secretary of DHS as a way to direct finite resources to those areas that are most at risk of terrorist attack under conditions of uncertainty. The purpose of risk management is not to eliminate all risks, as that is an impossible task. Rather, given limited resources, risk management is a structured means of making informed trade-offs and choices about how to use available resources effectively and monitoring the effect of those choices. Thus, risk management is a continuous process that includes the assessment of threats, vulnerabilities, and consequences to determine what actions should be taken to reduce or eliminate one or more of these elements of risk. Risk management includes a feedback loop that continually incorporates new information, such as changing threats or the effect of actions taken to reduce or eliminate identified threats, vulnerabilities, and/or consequences. Because we have imperfect information for assessing risks, there is a degree of uncertainty in the information used for risk assessments (e.g., what the threats are and how likely they are to be realized). As a result, it is inevitable that assumptions and policy judgments must be used in risk analysis and management. It is important that key decision makers understand the basis for those assumptions and policy judgments and their effect on the results of the risk analysis and the resource decisions based on that analysis. Since fiscal year 2006, DHS has applied a three-step process which incorporates analyses of risk and effectiveness, to select eligible urban areas and allocate UASI and SHSP funds (see fig. 1): 1. Implementation of a risk analysis model to calculate scores for states and urban areas, defining relative Risk, as the product of Threat, Vulnerability, and Consequences. 2. Implementation of an effectiveness assessment, including a peer review process, to assess and score the effectiveness of the proposed investments submitted by the eligible applicants. 3. Calculation of a final allocation of funds based on states' and urban areas' risk scores as adjusted by their effectiveness scores. Figure 1: Overview of the Grant Allocation Methodology for UASI and SHSP: [See PDF for image] This figure is an illustration of the Overview of the Grant Allocation Methodology for UASI and SHSP. The following information is depicted: UASI: Phase 1: Risk Analysis; Risk estimator: R = T x (V&C) [Relative risk estimate]; Relative risk is presented as a graph. Where relative risk drops and a cutoff point of about 42 urban areas is established, the result is a risk score. Phase 2: Effectiveness assessment: Peer review of Investment Justifications: yields an Effectiveness score. Phase 3: Final allocation: Effectiveness/risk matrix: Left axis is risk score; right axis is effectiveness score. As both score increase, allocations increase. SGSG: Phase 1: Risk Analysis; Risk estimator: R = T x (V&C) [Relative risk estimate]; Relative risk is presented as a graph. Where relative risk drops versus the number of states and territories, the result is a risk score. Phase 2: Effectiveness assessment: Peer review of Investment Justifications: yields an Effectiveness score. Phase 3: Final allocation: Effectiveness/risk matrix: Left axis is risk score; right axis is effectiveness score. As both score increase, allocations increase. There is a statutory minimum of .375%[A]. [A] The statutory minimum of 0.375 percent of the total funds appropriated for SHSP and UASI is for fiscal year 2008. In fiscal years 2006 and 2007, the statutory per state minimum equaled 0.75 percent of funds appropriated for SHSP only. Source: GAO analysis of DHS documents and information provided in interviews. [End of figure] As a result of the Post-Katrina Emergency Reform Act, FEMA is now responsible for the nation's homeland security preparedness effort to define what needs to be done, where, and by whom (roles and responsibilities); how it should be done; and how well it should be done--that is, according to what standards. This is a complex but critically important responsibility. The principal national documents designed to address each of these are, respectively, the National Response Framework (and its associated annexes), the National Incident Management System, and the National Preparedness Guidelines. To develop preparedness goals and determine the tasks and capabilities needed by first responders on a nationwide basis, DHS used an approach known as capabilities-based planning to develop the national Target Capabilities List. The list includes specific goals, requirements, and metrics for 36 capabilities needed at the local, state, or federal level to prepare for, respond to, and recover from natural or man-made disasters. DHS defined these capabilities generically and expressed them in terms of desired operational outcomes and essential characteristics, rather than dictating specific, quantifiable responsibilities to the various jurisdictions. Because no single jurisdiction or agency would be expected to perform every task, possession of a target capability could involve enhancing and maintaining local resources, ensuring access to regional and federal resources, or some combination of the two. The original list has since been refined, and FEMA released the most recent version of the list, with 37 capabilities, in September 2007. The Implementing Recommendations of the 9/11 Commission Act (9/11 Act) of 2007 further defined FEMA's role and coordination processes for working with states and urban areas in awarding homeland security grants.[Footnote 10] For example, the 9/11 Act requires FEMA to provide eligible metropolitan areas with the opportunity to submit relevant information prior to FEMA's initial assessment of the relative threat, vulnerability, and consequences each area faces from acts of terrorism. This opportunity is to allow potential grantees to correct any erroneous or incomplete information that will be the basis of FEMA's initial assessment.[Footnote 11] DHS Has Used an Evolving Risk-Based Methodology to Allocate Federal Grant Funds: DHS has used an evolving risk-based methodology to identify the states and urban areas eligible for HSGP grants and the amount of funds they receive. For example, the fiscal year 2005 risk analysis model largely relied on measures of population and population density to determine the relative risk of potential grant recipients. The fiscal year 2006 process introduced assessments of threat, vulnerability and consequences of a terrorist attack in assessing risk. The fiscal year 2006 risk analysis model estimated relative risk from two perspectives- -asset-based and geographic--then combined the assessments, assigning twice as much weight to geographic as asset-based risk. In DHS's view, asset-based and geographic risks are complementary and provide a "micro-and macro-" perspective of risk, respectively. In calculating these relative risk scores and addressing the uncertainties in estimating relative risk, policy and analytic judgments were required. For example, according to DHS officials, DHS made the judgment to assign geographic risk a weight of 1.0 and asset-based risk a weight of 0.5, since a potential loss of lives within an area would contribute to how geographic risk is assessed. Some of the factors used in the fiscal year 2006 risk analysis model included: the number of specific types of reports or events, such as reports of suspicious incidents; the number of visitors a state or urban area received from countries of interest; and population. In addition to modifications to DHS's risk analysis model, DHS adopted an effectiveness assessment for fiscal year 2006 to determine the anticipated effectiveness of the various risk mitigation investments urban areas proposed, which affected the final amount of funds awarded to eligible areas. The risk analysis method for fiscal year 2007--which is largely unchanged for fiscal year 2008, according to our ongoing work--was changed substantially from the fiscal year 2006 process, and further exemplifies the continuing evolution in DHS's approach to its risk methodology for grant allocation.[Footnote 12] Given the uncertainties inherent in risk assessment, the methodology uses a combination of empirical data (e.g., population, asset location) and policy judgment (e.g., the nature of the threat for specific areas and the weights to be assigned to specific variables in the model such as critical infrastructure, and population and population density). According to DHS officials, the fiscal year 2007 risk analysis model integrates the separate analyses for asset-based and geographic-based risk used in fiscal year 2006, and includes more sensitivity analysis in determining what the final results of its risk analysis should be.[Footnote 13] DHS officials said the primary goal was to make the process more transparent and more easily understood, focusing on key variables and incorporating comments from a variety of stakeholders regarding the fiscal year 2006 process. Figure 2 provides an overview of the factors included in the risk analysis model for fiscal year 2007 and, according to our ongoing work, for fiscal year 2008 and their relative weights. The maximum relative risk score possible for a given area was 100. The Threat Index accounted for 20 percent of the total risk score; Vulnerability and Consequences accounted for 80 percent. For the purposes of the model, DHS considered all areas of the nation equally vulnerable to attack and assigned every state and urban area a vulnerability score of 1.0. Thus, as a practical matter, the final risk score for fiscal years 2007 and 2008 is determined by the threat and consequences scores. Figure 2: DHS's Model Used in Determining Relative Risk Scores: [See PDF for image] This figure is an illustration of DHS's Model Used in Determining Relative Risk Scores. The following information is provided: Risk = Threat Index (T) x Vulnerability and Consequence Index (V&C = [P+E+I+N]): Threat Index (T): Data: On-going plot lines, credible reporting, relevant investigations to create threat tiers; Source: DHS Chief Intelligence Officer, intelligence community data. Vulnerability and Consequence Index: * Population Index (P): Data: Total population (nighttime, commuter, visitor, military dependent) and population density (constrained to 50 percent impact); Source: Census, LandScan, Smith Travel, and DOD. * Economic Index (E): Data: Gross Metropolitan Product (UASI)/percent GDP (state analysis); Source: Global Insight/Department of Commerce, Bureau of Economic Statistics. * National Infrastructure Index (I): Data: # Tier 1 Assets (x3) plus # Tier 2 assets; Source: DHS/OIP, SSAs, States. * National Security Index (N): Data: Presence of Military Bases (yes/no) plus # DIB plus # International border crossings; Source: DOD, DHS/CBP. Risk Scores: Population index: 40%; Economic index: 20%; Threat index: 20%; National Infrastructure index: 15%; National Security index: 5%. Source: DHS. Note: "On-going plot lines" reflects DHS analysis of threat information having a nexus with international terrorism or its affiliates. "DHS/ OIP" stands for DHS's Office of Infrastructure Protection, "SSAs" stands for Sector-Specific Federal Agencies, "DHS/CBP" stands for the DHS's Customs and Border Protection, and "DIB" stands for "defense industrial base." [End of figure] Threat: The Threat Index accounted for 20 percent of the total risk score, which was calculated by the intelligence community by assessing threat information for multiple years (generally, from 9/11 forward) for all candidate urban areas and categorizing urban areas into one of four tiers. Tier I included those at highest threat, relative to the other areas, and tier IV included those at lowest threat relative to the others. DHS's Office of Intelligence and Analysis performed this review and provided these threat assessments and corresponding threat values for each urban area. In contrast, for the 2006 grant cycle, DHS used total counts of threats and suspicious incidents and incorporated these into its model. The final threat assessments are approved by the intelligence community--the Federal Bureau of Investigation, Central Intelligence Agency, National Counter-Terrorism Center, and the Defense Intelligence Agency--along with the DHS Under Secretary for Intelligence & Analysis and the Secretary of DHS, according to DHS officials. Vulnerability and Consequences: Vulnerability and Consequences accounted for 80 percent of the total risk score and were represented by the following four indexes: * Population Index (40 percent): This variable included nighttime population and military dependent populations for states and urban areas, based upon U.S. Census Bureau and Department of Defense inputs. In addition, for urban areas, population density, commuters, and visitors were also factored into this variable, using data from private entities. * Economic Index (20 percent): This variable considered the economic value of the goods and services produced in either a state or an urban area. For states, this index was calculated using U.S. Department of Commerce data on their percentage contribution to Gross Domestic Product. For UASI urban areas, a parallel calculation of Gross Metropolitan Product was incorporated. * National Infrastructure Index (15 percent): This variable focused on over 2,000 Tier I and Tier II critical infrastructure/key resource assets that were identified by DHS's Office of Infrastructure Protection. Tier I assets or systems are those that if attacked could trigger major national or regional impacts similar to those experienced during Hurricane Katrina or 9/11. Tier II assets are other highly consequential assets with potential national or regional impacts if attacked. * National Security Index (5 percent): This variable considered the presence of three key national security factors: whether military bases are present in the state or urban area; how many critical defense industrial base facilities are located in the state or urban area; and the total number of people traversing international borders. Information on these inputs comes from the Department of Defense and DHS. To assess vulnerability and consequences, DHS specifically wanted to capture key land and sea ports of entry into the United States and the location of defense industrial base facilities and nationally critical infrastructure facilities.[Footnote 14] For fiscal year 2007 and, according to our ongoing work, for fiscal year 2008, DHS considered most areas of the country equally vulnerable to a terrorist attack, given freedom of movement within the nation; and focused on the seriousness of the consequences of a successful terrorist attack. Nationwide more than 2,000 critical infrastructure assets were included in the risk model and selected on the basis of analysis by DHS infrastructure protection analysts, sector-specific federal agencies, and the states. According to DHS, these critical infrastructure assets were grouped into two tiers: Tier 1 assets encompassed those that if attacked could cause major national or regional impacts similar to those from Hurricane Katrina or 9/11, while Tier 2 assets were those with potential national or regional impacts if attacked. On the basis of DHS's Office of Infrastructure Protection analysis, Tier I assets were weighted using an average value three times as great as Tier II assets. According to DHS officials, defense industrial base assets were included in the national security index and all other assets in the national infrastructure index. Effectiveness Assessment Used to Adjust Risk Scores: Since fiscal year 2006, DHS has also implemented an Effectiveness Assessment to assess and score the effectiveness of the proposed investments submitted by grant applicants in addition to determining relative risk using the risk analysis model. This effectiveness assessment process has remained largely unchanged since it was first introduced by DHS. To assess the anticipated effectiveness of the various risk mitigation investments that states and urban areas proposed, DHS required states and urban areas to submit investment justifications as part of their grant application. The investment justifications included up to 15 "investments" or proposed solutions to address homeland security needs, which were identified by the states and urban areas through their strategic planning process. DHS used subject-matter experts as peer reviewers to assess these investment justifications. The criteria reviewers used to score the investment justifications included the following categories: relevance to the National Preparedness Guidance and to state and local homeland security plans, anticipated impact, sustainability, regionalism, and the implementation of each proposed investment. Reviewers on each panel assigned scores for these investment justifications, which according to DHS officials were averaged to determine a final effectiveness score for each state and urban area applicant. DHS then used these effectiveness assessment scores to calculate the final allocation of funds to states and urban areas. DHS Has a Variety of Mechanisms in Place to Communicate with States and Localities about Grant Allocation Decisions: According to DHS officials and HSGP grant assistance documents we reviewed, DHS communicates with its state and local stakeholders by: (1) providing to each state and urban area the individual threat assessments that DHS is using to calculate the risk analysis model's Threat Index; (2) validating the nonpublic, critical infrastructure assets that comprise the risk analysis model's National Infrastructure Index; (3) providing midpoint reviews of states' and urban areas' draft investment justification proposals that are later reviewed during DHS's effectiveness assessment process; (4) providing technical assistance as states and urban areas prepare the documentation for their grant applications; and (5) convening conferences to solicit stakeholder feedback. DHS provides threat assessments for state and urban areas. DHS's Office of Intelligence and Analysis (I&A) officials said they develop and provide threat assessments to the states' and urban areas' grant applicants prior to the grant application process for their review. State and urban area strategic planning and grant planning officials use this information to develop their grant investment justifications, according to DHS officials. I&A officials said they provide secret and nonsecret versions of the information so that state or urban area officials who do not have the appropriate clearances required to view the secret version of their threat assessments will still have access to some of the threat information. They said they are working with local law enforcement agencies on a way to address such clearance issues. DHS validates the nonpublic, critical infrastructure assets used in the risk analysis model. DHS officials also said that the agency uses a collaborative, multistep process to create a list of national critical infrastructure assets for use in the National Infrastructure Index, one of the four indices that comprise the Vulnerability and Consequences component of the risk analysis model. According to DHS officials, they use a step-by-step process to identify the nation's Tier 1 and Tier 2 critical infrastructure assets. First, DHS's Office of Infrastructure Protection (OIP) works with sector-specific agencies to develop criteria used to determine which assets should be placed in a threat tier. Second, private-sector companies vet the criteria through sector- specific councils that review the criteria and provide feedback to DHS OIP. Third, the infrastructure office finalizes the criteria list and provides the list to the sector-specific agencies and asks states to nominate assets within their jurisdictions that match the criteria. Finally, the infrastructure office and the sector-specific agencies review nominated assets to decide which assets comprise the final Tier 1/Tier 2 list. In 2007, DHS began to allow sector-specific agencies to resubmit for reconsideration assets that are not initially selected for the list to ensure the consideration of potential critical infrastructure assets in future years. Enacted in August 2007, the 9/11 Act required DHS to provide eligible metropolitan areas with the opportunity to submit information that they believe to be relevant to the determination of the threat, vulnerability, and consequences they face from acts of terrorism, prior to FEMA conducting each initial assessment, so that any erroneous or incomplete information can be corrected.[Footnote 15] According to FEMA officials, DHS implemented this provision mainly through the outreach and communication efforts described above. DHS provides midpoint reviews of states' and urban areas' investment proposals. FEMA officials said that, for the fiscal year 2007 effectiveness assessment process, DHS offered a midpoint technical review of states' and urban areas' draft 2007 Investment Justifications prior to the formal submission of these proposals to FEMA's peer review process. DHS officials said that they performed an after-action analysis of this effort and found states and urban areas that made use of the midpoint reviews had effectiveness scores that on average were 6 percent higher than those for states and urban areas that did not take advantage of this DHS service. DHS provides technical assistance as states and urban areas prepare investment documentation. DHS also provides Program Management Technical Assistance, and Investment Planning Technical Assistance workshops to assist states and urban areas. For example, the Program Management Technical Assistance service is designed to help the State Administrative Agency with day-to-day program management in planning, managing, and evaluating state programs in the context of the National Preparedness Guidance, according to DHS. They said Program Management Technical Assistance helps state administrators use DHS's Program Management Handbook to manage programs that span agencies, jurisdictions, and disciplines, including the private sector. DHS also offers guidance on how to enhance existing state and urban area Homeland Security Strategies and Enhancement Plans. DHS convenes conferences to solicit stakeholder feedback. Finally, DHS has convened conferences in an effort to solicit stakeholder feedback after the fiscal years 2006 and 2007 grants were awarded. In July 2006, DHS convened a Homeland Security Grant Program After-Action conference to gather feedback on the UASI grant award process. DHS also assembled working groups to discuss and assess homeland security planning, the HSGP guidance and application, the risk assessment, and the effectiveness assessment. DHS officials told us that the conference provided a feedback loop intended to bolster stakeholder support and promote transparency. The state and local partners who participated in the working groups at the conference developed 32 recommendations to improve the HSGP process. For example, one of the risk assessment working group's recommendations was that DHS should provide detailed briefings to state and local partners on the core components of the risk methodology used in the fiscal year 2006 process as one step to improve the transparency of the risk analysis process. DHS also convened a similar after-action conference in early August 2007 to solicit stakeholder feedback on the fiscal year 2007 HSGP and hosted three regional conferences in the fall of 2007 to foster collaboration among regional partners and seek additional feedback. Prior DHS Efforts Improved the Timeliness of Transferring Grant Funds to States and Localities: From fiscal years 2002 through 2007, DHS obligated about $19.6 billion in grants, the purpose of which was to strengthen the capabilities of state, local, and tribal governments and others to prepare for and respond to major disasters of any type or cause. About $7 billion of this total was unexpended as of January 2008. As might be expected, the more recent the fiscal year, the higher the unexpended balance (see fig. 3). For example, the Homeland Security and UASI grant awards are announced in May or June of each year--or about 3 to 4 months before the end of the fiscal year. The awards for fiscal year 2007 were announced in May 2007. Thus, one would expect large unexpended balances for the most recent fiscal year because the grant recipients would have had only a few months to use their funds prior to the end of the fiscal year. Figure 3: Percent of Obligated DHS Grant Funds for Fiscal Years 2002 through 2007 That Were Unexpended as of January 2008: [See PDF for image] This figure is a stacked bar graph depicting the percent of Obligated DHS Grant Funds for fiscal years 2002 through 2007 that were unexpended as of January 2008. The following data is depicted: Fiscal year: 2002; Total obligated: $904,896,644; Total unexpended balance: $8,778,762; Percentage of obligated funds remaining unexpended: 0.97%. Fiscal year: 2003; Total obligated: $4,212,657,367; Total unexpended balance: $134,507,771; Percentage of obligated funds remaining unexpended: 3.19%. Fiscal year: 2004; Total obligated: $4,115,804,654; Total unexpended balance: $231,166,967; Percentage of obligated funds remaining unexpended: 5.62%. Fiscal year: 2005; Total obligated: $3,613,950,575; Total unexpended balance: $964,860,220; Percentage of obligated funds remaining unexpended: 26.70%. Fiscal year: 2006; Total obligated: $2,870,988,081; Total unexpended balance: $1,961,627,924; Percentage of obligated funds remaining unexpended: 68.33%. Fiscal year: 2007; Total obligated: $3,847,052,100; Total unexpended balance: $3,731,808,088; Percentage of obligated funds remaining unexpended: 97.00%. Source: FEMA, as of January, 2008. [End of figure] In 2005, we reported on DHS's efforts to distribute grants and found that the Congress, DHS, states, and localities had acted to expedite grant awards and distribution by setting time limits for the grant application, award, and distribution processes and by instituting other procedures.[Footnote 16] We concluded that the ability of states and localities to spend grant funds expeditiously was complicated by the need to fulfill state and local legal and procurement requirements, which in some cases added months to the purchasing process. We also reported that some states had modified their procurement practices and DHS was identifying best practices to aid in the effort, but challenges remained, such as continuing legal and procurement requirements that slowed the process. For example, once the grant funds are awarded to the states and then subgranted to the local jurisdictions or urban areas, certain legal and procurement requirements may have to be met, such as a city council's approval to accept grant awards. Or, if the state legislature must approve how the grant funds will be expended and is not in session when the grant funds are awarded, it could take as long as 4 months to obtain state approval to spend the funds.[Footnote 17] We reported a variety of steps that had been taken by states, DHS, and the Congress to streamline the expenditure of grant funds. For example: * Some states, in conjunction with DHS, had modified their procurement practices to expedite the procurement of equipment and services by establishing centralized purchasing systems that allow equipment and services to be purchased by the state on behalf of local jurisdictions, freeing them from some local legal and procurement requirements. Several states had developed statewide procurement contracts that allow local jurisdictions to buy equipment and services using a prenegotiated state contract. * DHS had enhanced equipment procurement options through agreements with the U.S. Department of Defense's Defense Logistics Agency and the Marine Corps Systems Command, to allow state and local jurisdictions to purchase equipment directly from their prime vendors. These agreements provide an alternative to state and local procurement processes and, according to DHS, often result in a more rapid product delivery at a lower cost. * The fiscal year 2005 DHS appropriations legislation included a provision that exempted formula-based grants (e.g., the State Homeland Security Grant Program grants) and discretionary grants, including the Urban Areas Security Initiative and other grants, from requirements in the Cash Management Improvement Act that provide for reimbursement to states and localities only after they have incurred an obligation, such as a purchase order, to pay for goods and services. Subsequent DHS guidance allowed states and localities to draw down funds up to 120 days prior to expenditure. We do not know the extent to which the actions that states and localities have taken to address the obstacles that affected their ability to use funds expeditiously (but effectively) have succeeded. We were unable to examine trends in expended and unexpended obligations for individual grants across fiscal years due to limitations in the budget data provided by FEMA for this hearing. For example, we were unable to track HSGP funding data across multiple fiscal years, such as the amount of fiscal year 2005 funds that were expended in fiscal years 2005, 2006, and 2007. In addition, we found that reporting categories were not consistent across fiscal years. Grant program data were collapsed in one fiscal year and compiled differently in another year. According to one DHS official, while the consolidation of all DHS grant programs into FEMA provides FEMA with an opportunity to standardize and enhance its management of grant allocation and distribution, this administrative transition has also resulted in some reorganization of accounting functions, and institutionalizing the maintenance of grant funding data is still being addressed at this time. Whatever the cause, the inconsistency in reporting on grant expenditures across fiscal years could hinder FEMA's ability to provide the Congress with information on trends in expenditures over time for specific grants. As part of our ongoing work in reviewing DHS grant allocation and management efforts, we plan to determine whether the data FEMA maintains on grant expenditures across fiscal years allows FEMA to analyze trends in grant obligations and expenditures. DHS Does Not Yet Have a Means to Measure Program Outcomes to Further the Nation's Homeland Security Preparedness Goals: While DHS has distributed over $19 billion in federal emergency preparedness funding to states, localities, and territories since fiscal year 2002, and taken steps to gather information, establish goals and measures, and measure progress, we still know little about how states have used federal funds to build their capabilities or reduce risks. Nor do we know how effective this national investment has been because DHS's monitoring of homeland security grant expenditures does not provide a means to measure the achievement of desired program outcomes to strengthen the nation's homeland security capabilities. In March 2007, we testified before this Committee that a comprehensive and in-depth oversight agenda requires assessing state and local capabilities and the use of federal grants in building and sustaining those capabilities. However, all levels of government are still struggling to define and act on the answers to basic--but hardly simple--questions about emergency preparedness and response: What is important (that is, what are our priorities)? How do we know what is important (e.g., risk assessments, performance standards)? How do we measure, attain, and sustain success? On what basis do we make necessary trade-offs, given finite resources? DHS has limited information on which to base the answers to these questions. We have identified the need for such capabilities-based assessment and reporting of the effectiveness of federal grant investments in several DHS grant programs. For example, in our review of cargo tanker emergency response in December 2007, we recommended that the Secretary of Homeland Security work with federal, state, and local stakeholders to develop explicit performance measures for emergency response capabilities and use them in risk-based analyses to set priorities for DHS grant programs in acquiring needed response resources.[Footnote 18] DHS responded that it was taking the recommendation under advisement and was exploring approaches to address our recommendation. Similarly, in our review of DHS's efforts to improve interoperable communications in April 2007, we reported that no process has been established for ensuring that states' grant requests are consistent with their statewide plans and long-term objectives for improving interoperability.[Footnote 19] We recommended that DHS assess how states' grant requests support their statewide communications plans and include the assessment as a factor in making DHS grant allocation decisions. Although DHS did not comment on this recommendation at the time, in August 2007 DHS officials told us they were working to ensure that all grant funding is tied to statewide interoperable communications plans.[Footnote 20] In a May 2007 testimony, we noted that more immediate congressional attention might focus on evaluating the construction and effectiveness of the National Preparedness System, which is mandated under the Post- Katrina Reform Act. DHS has taken steps to develop and issue key components of the system, including a national domestic all-hazards preparedness goal and readiness metrics and standards for preparedness in the form of target capabilities.[Footnote 21] Specifically, in September 2007, DHS issued a goal for national preparedness, now referred to as the National Preparedness Guidelines. According to DHS, the guidelines establish "a vision for national preparedness and provide a systematic approach for prioritizing preparedness efforts across the Nation," and generally define a goal for the National Preparedness system. The guidelines are based on a capability-based planning process that identified target capabilities that are to be then used to establish measures for preparedness. According to DHS officials, one way DHS is attempting to monitor the development of emergency preparedness capabilities is through the Effectiveness Assessment described above, that began as part of DHS's fiscal year 2006 HSPG grant guidance. According to program requirements, eligible recipients must provide an "investment justification" with their grant application that links their investments to the initiatives outlined in their state's Program and Capability Enhancement Plan. DHS officials have said that they cannot yet assess how effective the actual investments from grant funds are in enhancing preparedness and mitigating risk because they do not yet have the metrics to do so and there is insufficient historical information from the grant monitoring process to assess the extent to which states and urban areas are building capabilities. The Post-Katrina Reform Act established a requirement to create another source of information on state capabilities. The act calls for an annual preparedness report from all states by January 4, 2008, and annually thereafter, but FEMA has extended the deadline for this requirement.[Footnote 22] In December 2007, FEMA extended the State Preparedness Report deadline from January 4 to March 31, 2008 and requested that each state administrative agency submit a brief letter providing a status update on its State Preparedness Report by early this year. The state reports are to include assessments of: * State compliance with the national preparedness system, the National Response Framework, the National Incident Management System, and other related plans and strategies. * Current capability levels and a description of target capability levels. * Resource needs to meet the preparedness priorities established in conjunction with the Target Capabilities List, including (1) an estimate of the amount of expenditure required to attain the preparedness priorities, and (2) the extent to which the use of federal assistance during the preceding fiscal year achieved the preparedness priorities. Beginning in October 2007, DHS is also responsible for an annual federal preparedness report that is to include, among other things, an assessment of the extent to which the use of federal assistance during the preceding fiscal year achieved the preparedness priorities established under the act. Since 2005, DHS has produced an Annual Report on Preparedness Funding, which includes data on the obligation, expenditure status, and use of funds for all major federal preparedness grants--including non-DHS grants--awarded to states, localities, and other nonfederal entities. According to DHS, this effort is designed to provide decision makers with critical preparedness funding information as they determine how to best allocate resources to achieve target levels of capability to prevent, prepare, respond to, and recover from major events, especially terrorism. However, the report notes the information is of limited usefulness because federal departments and agencies interpret and define the terms obligation, expenditure status, and use of funds differently. The report provides a national-level summary of the use of grant funds such as equipment or training, rather than an assessment of state capability enhancements provided as a result of federal grant funding. According to DHS, subsequent reports may provide more detailed analysis and findings, as consistent procedures and definitions are implemented across grant programs and departments. Conclusions: The task of enhancing first responder capabilities across the nation is a complex and daunting one. DHS must continue to support FEMA's efforts to work with state, local, and tribal governments, and the private sector on the tasks it has begun. At the same time, these stakeholders must recognize that the process is iterative, will include periodic adjustments and refinements, and that risks are not equally distributed across the nation. As the principal federal agency now responsible for preparedness and response, FEMA has a unique opportunity to evaluate how it can most effectively target and integrate grants with its other efforts to enhance the nation's all-hazard disaster preparedness and response system. This can best be done by viewing these grants collectively, rather than individually. It is also important that FEMA and grant recipients be able to assess and report on how the grants have been used to enhance emergency preparedness and response capabilities and reduce risk. We look forward to working constructively with this Committee, FEMA, and DHS in the future to continue to build a national emergency preparedness system that we all want and our nation deserves. Mr. Chairman, this concludes my statement. I would be pleased to answer any questions that you or other members of the Subcommittees may have at this time. Contacts and Staff Acknowledgments: For further information about this statement, please contact William O. Jenkins Jr., Director, Homeland Security and Justice Issues, on (202) 512-8777 or jenkinswo@gao.gov. In addition to the contact named above, the following individuals from GAO's Homeland Security and Justice Team also made major contributors to this testimony: Chris Keisling, Assistant Director; John Vocino, Analyst-in-Charge; Michael Blinde, Analyst; and Linda Miller, Communications Analyst. [End of section] Related GAO Products: Department of Homeland Security: Progress Report on Implementation of Mission and Management Functions. GAO-07-454. Washington, D.C.: August 17, 2007. Homeland Security: Observations on DHS and FEMA Efforts to Prepare for and Respond to Major and Catastrophic Disasters and Address Related Recommendations and Legislation. GAO-07-1142T. Washington, D.C.: July 31, 2007. Homeland Security: Observations on DHS and FEMA Efforts to Prepare for and Respond to Major and Catastrophic Disasters and Address Related Recommendations and Legislation, GAO-07-835T Washington, D.C.: May 15, 2007. Homeland Security: Observations on DHS and FEMA Efforts to Prepare for and Respond to Major and Catastrophic Disasters and Address Related Recommendations and Legislation. GAO-07-835T. Washington, D.C.: May 15, 2007. First Responders: Much Work Remains to Improve Communications Interoperability, GAO-07-301 Washington, D.C.: Apr. 2, 2007. Homeland Security: Preparing for and Responding to Disasters. GAO-07- 395T. Washington, D.C.: March 9, 2007. Passenger Rail Security: Federal Strategy and Enhanced Coordination Needed to Prioritize and Guide Security Efforts. GAO-07-583T. Washington, D.C.: March 7, 2007. Homeland Security: Applying Risk Management Principles to Guide Federal Investments. GAO-07-386T. Washington, D.C.: February 7, 2007. Homeland Security Grants: Observations on Process DHS Used to Allocate Funds to Selected Urban Areas. GAO-07-381R. Washington, D.C.: February 7, 2007. Homeland Security First Responder Grants: Cash Management Improvement Act Exemption and Cash Advance Funding Require Additional DHS Oversight. GAO-07-68. Washington, D.C.: December 22, 2006. Emergency Preparedness and Response: Some Issues and Challenges Associated with Major Emergency Incidents. GAO-06-467T. Washington, D.C.: February 23, 2006. Homeland Security: Managing First Responder Grants to Enhance Emergency Preparedness in the National Capital Region. GAO-05-889T. Washington, D.C.: July 14, 2005. Homeland Security: DHS' Efforts to Enhance First Responders' All- Hazards Capabilities Continue to Evolve. GAO-05-652. Washington, D.C.: July 11, 2005. Homeland Security: Management of First Responder Grant Programs and Efforts to Improve Accountability Continue to Evolve. GAO-05-530T . Washington, D.C.: April 12, 2005. Homeland Security: Management of First Responder Grant Programs Has Improved, but Challenges Remain. GAO-05-121. Washington, D.C.: February 2, 2005. Homeland Security: Effective Regional Coordination Can Enhance Emergency Preparedness. GAO-04-1009. Washington, D.C.: September 15, 2004. Homeland Security: Federal Leadership Needed to Facilitate Interoperable Communications Between First Responders. GAO-04-1057T . Washington, D.C.: September 8, 2004. Homeland Security: Coordinated Planning and Standards Needed to Better Manage First Responder Grants in the National Capital Region. GAO-04- 904T. Washington, D.C.: June 24, 2004. Homeland Security: Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated Planning and Performance Goals. GAO-04-433. Washington, D.C.: May 28, 2004. Emergency Preparedness: Federal Funds for First Responders. GAO-04- 788T. Washington, D.C.: May 13, 2004. [End of section] Footnotes: [1] This figure includes such DHS grant programs as the Homeland Security Grant Program (HSGP), Infrastructure Protection Programs, and the Emergency Management Performance Grants. [2] The Post-Katrina Emergency Management Reform Act of 2006 was enacted as Title VI of the Department of Homeland Security Appropriations Act, 2007, Pub. L. No. 109-295, 120 Stat. 1355, 1394 (2006). [3] GAO, Homeland Security: Applying Risk Management Principles to Guide Federal Investments, GAO-07-386T (Washington, D.C.: Feb. 7, 2007). [4] GAO, Homeland Security Grants: Observations on Process DHS Used to Allocate Funds to Selected Urban Areas, GAO-07-381R (Washington, D.C.: Feb. 7, 2007); and Homeland Security Assistance for Nonprofits: Department of Homeland Security Delegated Selection of Nonprofits to Selected States and States Used a Variety of Approaches to Determine Awards, GAO-06-663R (Washington, D.C.: May 22, 2006). [5] GAO, Homeland Security: Management of First Responder Grant Programs Has Improved, but Challenges Remain, GAO-05-121 (Washington, D.C.: Feb. 2, 2005); and Homeland Security: Management of First Responder Grant Programs and Efforts to Improve Accountability Continue to Evolve, GAO-05-530T (Washington, D.C.: Apr. 12, 2005). [6] GAO, Passenger Rail Security: Federal Strategy and Enhanced Coordination Needed to Prioritize and Guide Security Effort, GAO-07-583T (Washington, D.C.: Mar. 7, 2007). [7] GAO, Homeland Security: Preparing for and Responding to Disasters, GAO-07-395T (Washington, D.C.: Mar. 9, 2007); Homeland Security: Observations on DHS and FEMA Efforts to Prepare for and Respond to Major and Catastrophic Disasters and Address Related Recommendations and Legislation, GAO-07-835T (Washington, D.C.: May 15, 2007); and Homeland Security: Observations on DHS and FEMA Efforts to Prepare for and Respond to Major and Catastrophic Disasters and Address Related Recommendations and Legislation, GAO-07-1142T (Washington, D.C.: July 31, 2007). [8] All states receive a statutorily specified minimum under the State Homeland Security Grant program. [9] For this formula, DHS defined Threat as international threat of terrorism to locations and critical assets in the United States, Vulnerability as the susceptibility of an area to successful attack, and Consequences as the personal, physical, and economic consequences to an area of a successful attack. [10] Pub. L. No. 110-53, tit. I, 121 Stat. 266, 271-94. [11] 6 U.S.C. § 604(b)(2)(B). [12] Fiscal year 2008 is the first year that FEMA has had responsibility for the risk assessment and grant allocations for these grants. [13] Sensitivity analysis can help gauge what effects key sources of uncertainty have on outcomes, which provides decision makers with additional data on alternative risk estimates and funding allocations resulting from analyses of varying data, judgments, and assumptions. [14] Ports of entry are government-designated locations where DHS inspects persons and goods to determine whether they may be lawfully admitted into the country. [15] 6 U.S.C. § 604(b)(2)(B). [16] GAO, Homeland Security: Management of First Responder Grant Programs Has Improved, but Challenges Remain, GAO-05-121, (Washington, D.C.: Feb. 2, 2005). [17] Once these requirements are satisfied, states, local jurisdictions, and urban areas can then obligate their funds for first responder equipment, exercises, training, and services. Generally, when a local jurisdiction or urban area directly incurs an expenditure, it submits related procurement documents, such as invoices, to the state. The state then draws down the funds. [18] GAO, Maritime Security: Federal Efforts Needed to Address Challenges in Preventing and Responding to Terrorist Attacks on Energy Commodity Tankers, GAO-08-141 (Washington, D.C.: Dec. 10, 2007). [19] GAO, First Responders: Much Work Remains to Improve Communications Interoperability, GAO-07-301 (Washington, D.C.: Apr. 2, 2007). [20] GAO, Department of Homeland Security: Progress Report on Implementation of Mission and Management Functions, GAO-07-454 (Washington, D.C.: Aug. 17, 2007). [21] GAO, Homeland Security: Observations on DHS and FEMA Efforts to Prepare for and Respond to Major and Catastrophic Disasters and Address Related Recommendations and Legislation, GAO-07-835T (Washington, D.C.: May 15, 2007). [22] In December 2007, FEMA extended the State Preparedness Report deadline from January 4, to March 31, 2008, and required each state administrative agency to submit a brief letter providing a status update on its State Preparedness Report by January, 2008. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548: