This is the accessible text file for GAO report number GAO-11-65 
entitled 'Personnel Security Clearances: Progress Has Been Made to 
Improve Timeliness but Continued Oversight Is Needed to Sustain 
Momentum' which was released on December 1, 2010. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as 
part of a longer term project to improve GAO products' accessibility. 
Every attempt has been made to maintain the structural and data 
integrity of the original printed product. Accessibility features, 
such as text descriptions of tables, consecutively numbered footnotes 
placed at the end of the file, and the text of agency comment letters, 
are provided but may not exactly duplicate the presentation or format 
of the printed version. The portable document format (PDF) file is an 
exact electronic replica of the printed version. We welcome your 
feedback. Please E-mail your comments regarding the contents or 
accessibility features of this document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

United States Government Accountability Office:
GAO: 

Report to Congressional Requesters: 

November 2010: 

Personnel Security Clearances: 

Progress Has Been Made to Improve Timeliness but Continued Oversight 
Is Needed to Sustain Momentum: 

GAO-11-65: 

GAO Highlights: 

Highlights of GAO-11-65, a report to congressional requesters. 

Why GAO Did This Study: 

In light of long-standing problems with delays and backlogs, Congress 
mandated personnel security clearance reforms through the Intelligence 
Reform and Terrorism Prevention Act of 2004 (IRTPA). These included 
requirements related to timeliness, reciprocity, and the creation of a 
single database to house personnel security clearance information. In 
2008, Executive Order 13467 established the Performance Accountability 
Council. GAO was asked to review the extent to which executive branch 
agencies (1) investigate and adjudicate personnel security clearance 
applications in a timely manner, (2) honor previously granted security 
clearances, and (3) share personnel security clearance information in 
a single, integrated database. GAO reviewed and analyzed Performance 
Accountability Council timeliness data for fiscal year 2009 and the 
first three quarters of fiscal year 2010. GAO also examined key 
clearance reform documents and conducted interviews with executive 
branch agencies, including members of the Intelligence Community, to 
discuss the three stated objectives. 

What GAO Found: 

Significant overall progress has been made to improve the 
investigation and adjudication of personnel security clearance 
applications in a timely manner. This is largely attributable to the 
Department of Defense (DOD), whose clearances comprise a vast majority 
of governmentwide initial clearances. IRTPA establishes an objective 
for all agencies to make a determination on at least 90 percent of all 
applications for a personnel security clearance within an average of 
60 days. The majority of clearances are processed in line with the 
IRTPA 60-day objective. Certain agencies, however, continue to face 
challenges for meeting timeliness objectives. Out of the 14 agencies 
included in GAO’s review, DOD, the Department of Energy, and the 
National Geospatial-Intelligence Agency met the IRTPA 60-day 
timeliness objective in the first three quarters of fiscal year 2010. 
Timeliness among the other executive branch agencies ranged from 62 to 
154 days. IRTPA and the recent Intelligence Authorization Act for 
Fiscal Year 2010 also require annual reporting on the progress made 
towards meeting objectives, including a discussion of impediments 
related to timeliness and quality. While the Performance 
Accountability Council has taken steps to assist in implementation of 
reform efforts, it has not reported on the impediments to meeting 
timeliness objectives for specific agencies not yet achieving this 
goal. 

Executive branch agency officials stated that they often honor 
previously granted personnel security clearances (i.e., grant 
reciprocity), but the true extent of reciprocity is unknown because 
governmentwide metrics do not exist. IRTPA generally requires that all 
personnel security clearance investigations and determinations be 
accepted by all agencies, with limited exceptions when necessary for 
national security purposes. Agency officials stated that they grant 
reciprocity, but some noted that they have taken steps to obtain 
additional information before granting reciprocity. For example, 
officials stated that they may request copies of background 
investigation reports before they will honor a security clearance 
because information available in databases contain limited, summary 
level detail. Agency officials also reported that steps must be taken 
to conduct suitability determinations to ensure an applicant’s 
character is appropriate for the position. The extent to which 
reciprocity is occurring is unknown because no metrics exist to 
consistently and comprehensively track reciprocity. 

Although there are no plans to develop a single, integrated database, 
steps have been taken to upgrade existing systems and increase 
information sharing. The Performance Accountability Council has opted 
to leverage existing systems in lieu of the single, integrated 
database required by IRTPA. Officials assert that a single database is 
not a viable option due to concerns related to privacy, security, and 
data ownership. Therefore, a single search capability of existing 
databases is being used to address the IRTPA requirement. For example, 
information from two primary databases can now be accessed from a 
single entry point, allowing executive branch agencies to share 
clearance information with one another. The Intelligence Community 
agencies share information through a separate database. 

What GAO Recommends: 

GAO recommends that the Performance Accountability Council collaborate 
with executive agencies to develop a plan to improve timeliness for 
those agencies not yet achieving the 60-day timeliness objective and 
metrics to track reciprocity. In commenting on this draft, the 
Performance Accountability Council concurred with all recommendations. 

View [hyperlink, http://www.gao.gov/products/GAO-11-65] or key 
components. For more information, contact Brenda S. Farrell at (202) 
512-3604 or farrellb@gao.gov. 

[End of section] 

Contents: 

Letter: 

Results in Brief: 

Background: 

Significant Overall Progress Has Been Made to Improve Timeliness, but 
Some Executive Agencies Continue to Face Challenges in Meeting 
Timeliness Objectives: 

Executive Agencies Often Grant Reciprocity, Although Challenges Exist 
to Measuring and Tracking Reciprocity: 

Although There Are No Plans to Develop a Single, Integrated Database, 
Steps Have Been Taken to Upgrade Existing Systems and Increase 
Information Sharing: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Appendix I: Scope and Methodology: 

Appendix II: Comments from the Office of the Director of National 
Intelligence: 

Appendix III: Comments from the Office of Personnel Management: 

Appendix IV: GAO Contact and Staff Acknowledgments: 

Related GAO Products: 

Figures: 

Figure 1: Key Events Related to the Security Clearance Reform Effort: 

Figure 2: Timeliness for the First Three Quarters of Fiscal Year 2010: 
Average of the Fastest 90 Percent of Initial Clearance Cases for 
Select Executive Branch Agencies: 

Abbreviations: 

DOD: Department of Defense: 

e-QIP: electronic Questionnaires for Investigations Processing: 

GAO: Government Accountability Office: 

IRTPA: Intelligence Reform and Terrorism Prevention Act of 2004: 

ODNI: Office of the Director of National Intelligence: 

OMB: Office of Management and Budget: 

OPM: Office of Personnel Management: 

[End of section] 

United States Government Accountability Office: 
Washington, DC 20548: 

November 19, 2010: 

The Honorable Anna G. Eshoo: 
Chairwoman: 
Subcommittee on Intelligence Community Management: 
Permanent Select Committee on Intelligence: 
House of Representatives: 

The Honorable Rush D. Holt: 
House of Representatives: 

Personnel security clearances allow government and industry personnel 
to gain access to classified information that, through unauthorized 
disclosure, can in some cases cause exceptionally grave damage to U.S. 
national security. The July 2010 and subsequent October 2010 reported 
unauthorized leak, of almost 500,000 classified documents posted to 
the Internet, related to the ongoing wars in Afghanistan and Iraq 
highlights the inherent risks involved when granting an individual a 
security clearance. Following the terrorist attacks on September 11, 
2001, the nation's defense and intelligence needs grew, prompting 
increased demand for personnel with security clearances. Accompanying 
this increase in demand for clearances have been problems of delays 
and backlogs in the personnel security clearance process. In 2005, GAO 
first designated the Department of Defense's (DOD) personnel security 
clearance program a high-risk area because of these delays and 
backlogs.[Footnote 1] We continued that designation in our 2007 and 
2009 updates to our high-risk list because delays continued and we 
found problems with the quality of investigation and adjudication 
documentation.[Footnote 2] For example, in our previous work, we noted 
that the average time to complete the fastest 90 percent of initial 
clearances for military and DOD civilians was 124 days.[Footnote 3] We 
have initiated additional work to assess DOD's personnel security 
clearance program and plan to issue our next high-risk report in 
January 2011. 

In light of long-standing concerns regarding delays in processing 
clearances and other issues, Congress set objectives and established 
requirements for improving the clearance process in section 3001 of 
the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). 
[Footnote 4] IRTPA established objectives for timeliness, requirements 
for reciprocity (i.e., an agency's acceptance of a background 
investigation or clearance determination completed by any authorized 
investigative or adjudicative agency), and an integrated, secure 
database to house clearance information. In 2007, DOD and the Office 
of the Director of National Intelligence (ODNI) formed the Joint 
Security Clearance Process Reform Team, known as the Joint Reform 
Team, to improve the security clearance process governmentwide. 
[Footnote 5] In the following year, Executive Order 13467 was issued, 
establishing a Suitability and Security Clearance Performance 
Accountability Council (Performance Accountability Council) that is 
responsible for driving the implementation of reform and accountable 
to the President for achieving the reform effort's goals. We have 
previously noted that top leadership must be committed to 
organizational transformation.[Footnote 6] To this end, committed 
executive leadership has worked to reform the personnel security 
clearance process by improving timeliness and developing quality 
measures. However, four years after IRTPA was enacted, the House 
Permanent Select Committee on Intelligence, Subcommittee on 
Intelligence Community Management, concluded that the federal 
government's progress with respect to IRTPA requirements for 
reciprocity and a single integrated database had fallen short of the 
goals established in IRTPA.[Footnote 7] 

Congressional oversight through hearings held by the Subcommittee on 
Intelligence Community Management in February, July, and September 
2008, and October 2009, has helped focus attention on the need for 
security clearance reform.[Footnote 8] In addition, the Intelligence 
Authorization Act for Fiscal Year 2010 requires reports by the 
President on the security clearance process, including information on 
timeliness and quality.[Footnote 9] In this context and building on 
our body of work examining personnel security clearance issues, you 
asked us to examine the ongoing reform effort with an emphasis on 
whether the current reform efforts were expediting the processing of 
clearances and enhancing reciprocity.[Footnote 10] Specifically, this 
report provides information on the extent to which select executive 
branch agencies (1) investigate and adjudicate initial personnel 
security clearance applications for civilians, military, and industry 
personnel in a timely manner; (2) honor previously granted personnel 
security clearances and the challenges, if any, that exist related to 
reciprocity; and (3) share personnel clearance information in a 
single, integrated database. 

In conducting this review, we focused our scope on DOD, seven agencies 
within the Intelligence Community,[Footnote 11] and a non-probability 
sample of six additional executive branch agencies [Footnote 12] that 
use the Office of Personnel Management (OPM) to conduct background 
investigations.[Footnote 13] The total sample of executive branch 
agencies represents 25 different DOD and non-DOD organizations. 
[Footnote 14] According to data contained in the Performance 
Accountability Council's 2010 report to Congress on clearances granted 
in calendar year 2009, the 14 agencies we selected in our timeliness 
review account for approximately 98 percent of initial clearance cases 
governmentwide annually.[Footnote 15] To assess the extent to which 
executive branch agencies investigate and adjudicate initial personnel 
security clearance applications for civilians, military, and industry 
personnel in a timely manner we conducted interviews with relevant 
officials to discuss aspects of timeliness, including variations in 
agency timeliness, progress made, and challenges faced. We analyzed 
the timeliness objectives specified in IRTPA and the timeliness data 
contained in the Performance Accountability Council's 2010 report to 
Congress on clearances granted in calendar year 2009.[Footnote 16] We 
obtained and reviewed quarterly data on executive branch agencies, 
including Intelligence Community agencies, provided by the Performance 
Accountability Council Subcommittee on Performance Management and 
Measures, which covered the first through third quarters of fiscal 
year 2010.[Footnote 17] These data were current as of August 2010. We 
also obtained and reviewed quarterly data for the executive branch 
agencies provided by OPM for the same time periods. The Performance 
Accountability Council reported agency timeliness data using two 
distinct methodologies. First, they calculated IRTPA timeliness by 
analyzing investigation and adjudication data separately, calculating 
the average timeliness of the fastest 90 percent of investigations and 
adjudications based on the fiscal quarter that the phase was reported 
as complete, and combining the timeliness data for the averages of 
investigations with the averages for adjudications by agency. The 
second methodology used by the Performance Accountability Council 
addressed only cases that were completed in the specific period. Under 
this methodology, the Performance Accountability Council calculated 
the "end-to-end" timeliness, which they defined as the time for an 
individual case to go through the initiation, investigation, and 
adjudication phases of the process. GAO utilized this second 
methodology to review and analyze the agency timeliness data that is 
contained in this report. The Performance Accountability Council 
excludes certain cases that could impact overall timeliness from its 
analysis. For example, IRTPA establishes a timeliness objective for 
the fastest 90 percent of cases, which allows agencies to exclude the 
slowest 10 percent of cases from the reported averages. We interviewed 
knowledgeable officials about the accuracy and completeness of the 
data to determine the reliability of the data. We determined that 
these data were sufficiently reliable for our purposes. 

To assess the extent to which executive branch agencies honor 
previously granted security clearances and the challenges, if any, 
that exist related to reciprocity, we reviewed the requirements 
specified in IRTPA and analyzed Executive Orders, Office of Management 
and Budget (OMB) memorandums, ODNI documents, and agency guidance 
related to reciprocity. We also analyzed existing and planned metrics 
developed by the Performance Accountability Council to track the 
extent to which reciprocity is honored. We met with security officials 
and adjudicators from DOD, the Intelligence Community, and a non-
probability sample of executive branch agencies. We supplemented our 
analyses with information obtained from a roundtable discussion that 
we conducted with representatives of Intelligence Community agencies 
to examine the challenges these agencies face related to information 
sharing and granting reciprocity. For the purposes of our report, we 
define reciprocity as an agency's acceptance of a background 
investigation or clearance determination completed by another 
authorized investigative or adjudicative agency. We excluded from the 
scope of our work issues related to access to facilities, detailed 
employees, or access to classified information. 

To determine the extent to which select executive branch agencies 
share personnel clearance information in a single, integrated 
database, we conducted interviews with officials from OPM, DOD, and 
Intelligence Community agencies and reviewed OPM database enhancement 
plans that described recent developments in information sharing. We 
selected OPM, DOD, and agencies within the Intelligence Community 
because they own the three main security clearance databases that are 
used in the security clearance process.[Footnote 18] To determine the 
challenges associated with sharing clearance information in a single, 
integrated database, we reviewed the Joint Reform Team's Enterprise 
Information Technology Strategy and interviewed agency security 
managers and adjudicators who use the existing security clearance 
database systems. 

We conducted this performance audit from October 2009 through November 
2010 in accordance with generally accepted government auditing 
standards. Those standards require that we plan and perform the audit 
to obtain sufficient, appropriate evidence to provide a reasonable 
basis for our findings and conclusions based on our audit objectives. 
We believe that the evidence obtained provides a reasonable basis for 
our findings and conclusions based on our objectives. More detailed 
information on our scope and methodology is provided in appendix I. 

Results in Brief: 

Significant overall progress has been made to improve the 
investigation and adjudication of personnel security clearance 
applications in a timely manner. This is largely attributable to DOD, 
whose clearances comprise a vast majority of governmentwide initial 
clearances. IRTPA established an objective for each authorized 
adjudicative agency to "make a determination on at least 90 percent of 
all applications for a personnel security clearance within an average 
of 60 days from the date of receipt of the completed application by an 
authorized investigative agency" by December 17, 2009.[Footnote 19] 
Although the majority of clearances are processed in line with the 
IRTPA 60-day objective, agencies continue to face challenges for 
meeting timeliness objectives. According to the Performance 
Accountability Council's February 2010 annual report to Congress, five 
of the 14 agencies we included in our review met the IRTPA 60-day 
objective in the first quarter of fiscal year 2010.[Footnote 20] We 
found that four agencies met the objective in the second quarter and 
seven agencies met the objective in the third quarter.[Footnote 21] 
The Department of Defense, the Department of Energy, and the National 
Geospatial-Intelligence Agency met the IRTPA 60-day timeliness 
objective in all three quarters. We found a number of challenges to 
agencies meeting IRTPA timeliness objectives, including personnel 
limitations, variances among the agencies in adopting information 
technology caused by resource constraints, and additional agency-
specific requirements that must be met before granting a security 
clearance. Agency officials with whom we spoke explained that there is 
a variance in agencies' adoption of the Electronic Questionnaires for 
Investigations Processing (e-QIP). According to these officials, e-QIP 
has sped up investigation timeliness for agencies that have adopted 
this technology because it provides OPM with more complete and better 
quality data earlier in the process. Agency officials also discussed 
the delays in adjudicative timeliness due to the need to follow up on 
investigations performed by OPM. Finally, timeliness for the 
Intelligence Community is affected by unique issues related to 
conditions of employment that require polygraphs or psychological 
evaluations that extend beyond the standard background investigation. 
IRTPA also requires the executive branch to submit an annual report, 
through 2011, to the appropriate congressional committees on the 
progress made toward meeting its requirements, including timeliness 
data and a discussion of any impediments to the smooth and timely 
functioning of its requirements.[Footnote 22] While the Performance 
Accountability Council, responsible for driving implementation of the 
reform effort and ensuring accountability, has taken steps to assist 
in implementation of reform efforts, it has not reported on the 
impediments to meeting timeliness objectives or plans to address 
impediments. As a result, decision makers may not have a complete 
picture of the progress made or the impediments to meeting timeliness 
objectives. We recommend that the Deputy Director of Management, OMB, 
in the capacity as Chair of the Performance Accountability Council, 
direct the Performance Accountability Council to collaborate with the 
agencies that are not meeting timeliness objectives to take the 
following actions: (1) identify challenges to timeliness, (2) develop 
mitigation strategies to enable each agency to comply with the IRTPA 
timeliness objectives, (3) set timelines for accomplishing the 
required actions, (4) monitor agency progress, and (5) report on these 
plans and progress in the annual reports to Congress. 

Agency officials stated that they routinely take steps to honor 
previously granted security clearances; however, there are no 
governmentwide metrics to comprehensively track when and why 
reciprocity is granted or denied. IRTPA generally requires that all 
security clearance investigations and determinations be accepted by 
all agencies, with limited exceptions when necessary for national 
security purposes.[Footnote 23] Further, ODNI guidance signed out in 
October 2008 amplifies this reciprocity requirement, stating that, 
except in limited circumstance, all Intelligence Community elements 
should "accept all in-scope security clearance or access 
determinations."[Footnote 24] Similarly, OMB issued guidance requiring 
agencies to reciprocally accept clearances when the prior clearance is 
current and there is no new derogatory information, among other 
things.[Footnote 25] However, agency officials stated that in some 
cases, they find it necessary to take additional steps to address 
limitations with available information before granting a reciprocal 
clearance. For example, because no single, integrated database exists 
and information currently being shared between agencies may be 
insufficient, agencies request additional information, such as copies 
of the original background investigation. Similarly, because of the 
different types of background investigations required by individual 
agencies, agencies may perform additional investigative work or 
request a new background investigation. In addition, agency officials 
identified broader challenges to granting reciprocity, such as the 
need to conduct suitability determinations or determine whether a 
prior clearance investigation and adjudication meets standards. All 
federal agencies are required to conduct basic suitability 
determinations to ensure that the applicant's character or conduct is 
appropriate for the position in question. However, some agencies have 
specific requirements to determine suitability before reciprocating a 
security clearance, according to agency officials with whom we spoke. 
While the Performance Accountability Council has identified 
reciprocity as a governmentwide strategic goal, we found that there is 
no clear evidence to show the extent to which reciprocity is granted 
because agencies lack comprehensive, standardized metrics to track 
reciprocity. We previously reported that developing metrics for 
assessing and regularly monitoring all aspects of the clearance 
process could add value in current and future reform efforts as well 
as supply better information for greater congressional oversight. 
[Footnote 26] However, we found that agencies do not consistently 
document the additional steps they have taken prior to granting a 
reciprocal clearance. For example, the Navy keeps electronic 
documentation, the Department of Energy and the Department of the 
Treasury keep paper documentation, and the Army and the Air Force do 
not maintain any documentation on the additional steps taken to accept 
a previously granted security clearance. Consequently, there is no 
consistent tracking of the amount of staff time spent on the 
additional actions that are taken to honor a previously granted 
security clearance. In addition, we found agencies do not consistently 
and comprehensively track the extent to which reciprocity is granted. 
While OPM has a metric to track reciprocity, this metric captures 
limited information, such as numbers of requested and rejected 
investigations, but not the number of cases in which a previously 
granted security clearance was or was not honored. Similarly, the 
metrics proposed by the Performance Accountability Council do not 
track the extent to which reciprocity is or is not ultimately honored. 
Without comprehensive, standardized metrics to track reciprocity, and 
documentation of the process, decision makers lack a complete picture 
of the extent to which reciprocity is granted and the challenges to 
honoring security clearances. We recommend that the Deputy Director of 
Management, OMB, in the capacity as Chair of the Performance 
Accountability Council, develop comprehensive metrics to track 
reciprocity and report the findings from the expanded tracking to 
Congress. 

Although IRTPA required the establishment of a single, integrated 
database, executive branch agencies have opted to focus on leveraging 
existing systems rather than establish a new database. IRTPA required 
that, not later than 12 months after the date of enactment of the act, 
the Director of the Office of Personnel Management and the Director of 
the Office of Management and Budget establish and commence operating 
and maintaining a single, integrated database of personnel security 
clearance information.[Footnote 27] Based on our analyses of a series 
of recent reports that the Joint Reform Team, under the Performance 
Accountability Council, issued between 2008 and 2010, and interviews 
conducted with OPM and ODNI officials, we found that there are no 
plans to create a new single, integrated database. OPM, DOD, and ODNI 
officials with whom we spoke explained that establishing a single, 
integrated database is not a viable option due to concerns related to 
privacy, security, and data ownership. Therefore, the Performance 
Accountability Council is focusing on using a single search capability 
of existing databases as the means by which they intend to address the 
IRTPA requirement. Although there are no plans to create a new 
governmentwide database, we found that non-intelligence agencies in 
our review are sharing information about personnel who hold or are 
seeking security clearances through two main databases that can be 
accessed through a single entry point. These two primary databases are 
used by non-intelligence agencies to store investigative and 
adjudicative information and according to the Performance 
Accountability Council, they account for decisions on about 90 percent 
of all security clearance holders in the federal government.[Footnote 
28] Data is stored in either OPM's Central Verification System or 
DOD's Joint Personnel Adjudication System. Data from the two databases 
can be searched from a single entry point in the Central Verification 
System. In contrast, the Intelligence Community agencies share 
information with one another through a separate classified database 
known as Scattered Castles. According to Performance Accountability 
Council officials, the Performance Accountability Council is 
participating in an effort to explore ways to enhance information 
sharing between the Intelligence Community agencies and the non-
Intelligence Community agencies. For example, a working group has been 
established to study alternatives to support a single-access point 
from which non-intelligence agencies can obtain clearance information 
and plans to complete its review in December 2010. 

In oral and written comments on a draft of this report, the OMB, ODNI, 
and OPM concurred with all of our recommendations. In particular, ODNI 
noted that it was already taking steps through the Performance 
Accountability Council to implement each recommendation. OMB, ODNI, 
DOD, and OPM also provided technical comments, which we incorporated 
into this report, as appropriate. 

Background: 

Personnel security clearances are required for access to certain 
national security information, which may be classified at one of three 
levels: confidential, secret, or top secret. A top secret clearance is 
generally also required for access to Sensitive Compartmented 
Information or Special Access Programs[Footnote 29]. The level of 
classification denotes the degree of protection required for 
information and the amount of damage that unauthorized disclosure 
could reasonably be expected to cause to national security. 
Unauthorized disclosure could reasonably be expected to cause (1) 
"damage," in the case of confidential information; (2) "serious 
damage," in the case of secret information; and (3) "exceptionally 
grave damage," in the case of top secret information. To ensure the 
trustworthiness and reliability of personnel in positions with access 
to classified information, government agencies rely on a multiphased 
personnel security clearance process that includes the application 
submission phase, investigation phase, and adjudication phase. 

* The application submission phase. A security officer from an agency 
(1) requests an investigation of an individual requiring a clearance; 
(2) forwards a personnel security questionnaire (standard form 86) 
using OPM's e-QIP system or a paper copy of the standard form 86 to 
the individual to complete; (3) reviews the completed questionnaire; 
and (4) sends the questionnaire and supporting documentation, such as 
fingerprints, to OPM or the investigation service provider. 

* The investigation phase. Federal investigative standards and OPM's 
internal guidance are used to conduct and document the investigation 
of the applicant.[Footnote 30] The scope of information gathered in an 
investigation depends on the level of clearance needed and whether an 
investigation for an initial clearance or reinvestigation for a 
clearance renewal is being conducted.[Footnote 31] For example, the 
federal standards require that investigators collect information from 
national agencies, such as the Federal Bureau of Investigation, for 
all initial and renewal clearances. For an investigation for a 
confidential or secret clearance, investigators gather much of the 
information electronically. For an investigation for a top secret 
clearance, investigators gather additional information through more 
time-consuming efforts, such as traveling to conduct in-person 
interviews to corroborate information about an applicant's employment 
and education. After the investigation is complete, the resulting 
investigative report is provided to the agency. According to the 
Performance Accountability Council's Strategic Framework, for the 
purposes of IRTPA timeliness reporting, investigative time is the time 
in days from the receipt date of the completed personnel security 
package by the investigative service provider to the date the final 
investigative file is forwarded to the adjudicative facility if sent 
electronically. 

* The adjudication phase. Adjudicators from an agency use the 
information from the investigative report to determine whether an 
applicant is eligible for a security clearance. To make clearance 
eligibility decisions, federal requirements specify that adjudicators 
consider guidelines in 13 specific areas that elicit information about 
(1) conduct that could raise security concerns and (2) factors that 
could allay those security concerns and permit granting a clearance. 
According to the Performance Accountability Council's Strategic 
Framework, for the purposes of IRTPA timeliness reporting, 
adjudicative time is the time in days from the date the final 
investigative file is forwarded (or received electronically) to the 
adjudicative unit to the date of the adjudicative decision. 

* Separate from, but related to, security clearances, are suitability 
determinations. Executive branch agencies conduct additional 
suitability investigations for individuals to ensure that they are 
suitable for employment in certain positions.[Footnote 32] For 
example, the Department of Justice conducts additional suitability 
checks to ensure applicants for jobs with the Drug Enforcement Agency 
have not used drugs. In addition, Health and Human Services conducts 
additional suitability investigations on applicants for jobs working 
with children. Similarly, the Intelligence Community requires a 
polygraph evaluation, among other things, to determine suitability for 
most positions. 

In light of long-standing delays and backlogs in processing security 
clearances, Congress set goals and established requirements for 
improving the clearance process in the Intelligence Reform and 
Terrorism Prevention Act of 2004. In 2005, GAO designated DOD's 
personnel security clearance program as a high risk area.[Footnote 33] 
As can be seen in figure 1, a number of steps have been taken to 
reform the process, including: 

* Role of the Office of Management and Budget in security clearance 
process. In June 2005, the President issued an executive order as part 
of the administration's efforts to improve the security clearance 
process and implement the statutory clearance requirements in 
IRTPA.[Footnote 34] This order tasked the Director of OMB with a 
variety of functions in order to ensure that agency processes relating 
to determining eligibility for access to classified national security 
information were appropriately uniform, centralized, efficient, 
effective, timely, and reciprocal. These actions included taking a 
lead role in preparing a November 2005 plan to improve the timeliness 
of personnel security clearance processes governmentwide. 

* Formation of the Joint Reform Team. The Joint Security Process 
Reform Team, also known as the Joint Security and Suitability Reform 
Team or Joint Reform Team, formed in June 2007, was established by the 
Director of National Intelligence and Under Secretary of Defense for 
Intelligence through a memorandum of agreement to execute joint reform 
efforts to achieve IRTPA timeliness goals and improve the processes 
related to granting security clearances and determining suitability 
for government employment. Agencies included in this governmentwide 
reform effort are ODNI, DOD, OMB, and OPM. The Joint Reform Team 
continues to work on the reform effort under the Performance 
Accountability Council by providing progress reports, recommending 
research priorities, and overseeing the development and implementation 
of an information technology strategy, among other things. Since its 
formation, the Joint Reform Team under the Performance Accountability 
Council: 

(1) Submitted an initial reform plan to the President on April 30, 
2008. The plan proposed a new process for determining clearance 
eligibility that departs from the current system in a number of ways, 
including the use of a more sophisticated electronic application, a 
more flexible investigation process, and the establishment of ongoing 
evaluation procedures between formal clearance investigations. The 
report was updated in December 2008 to include an outline of reform 
progress and further plans. 

(2) Issued an Enterprise Information Technology Strategy to support 
the reformed security and suitability process in March 2009. According 
to the report, the Joint Reform Team is pursuing an approach that 
leverages existing systems and capabilities, where applicable, and 
developing new tools where necessary. 

* Formation of the Performance Accountability Council. Executive Order 
13467 established the leadership structure for security and 
suitability reform headed by the Suitability and Security Clearance 
Performance Accountability Council as the entity responsible for 
aligning security and suitability, holding agencies accountable for 
implementation, and overseeing progress toward the reformed vision. 
[Footnote 35] This executive order directed, among other things, that 
executive branch policies and procedures be aligned and use consistent 
standards, to the extent possible, for investigating and adjudicating 
whether an individual is (1) suitable for government employment, (2) 
fit to be a contract employee, or (3) eligible for access to 
classified information. The Performance Accountability Council is 
accountable to the President to achieve reform goals and also oversees 
newly designated Security and Suitability Executive Agents. The 
executive order designated the Director of National Intelligence as 
the Security Executive Agent, the Director of OPM as the Suitability 
Executive Agent, and the Deputy Director for Management at OMB as the 
chair of the council with the authority to designate officials from 
additional agencies to serve as members. The council currently 
comprises representatives from 11 executive agencies. In May 2010, the 
Performance Accountability Council proposed quality measures to 
address the different phases of the application process including 
validating need, e-application, investigation, and adjudication. The 
measures also include the responsible organization, population 
covered, collection method, and whether it is a current or future 
measure. 

* Strategic Framework. The Performance Accountability Council issued a 
Strategic Framework in February 2010 to articulate the goals of the 
security and suitability process reform. The Strategic Framework sets 
forth a mission and strategic goals, performance measures, a 
communications strategy, roles and responsibilities, and metrics to 
measure the quality of security clearance investigations and 
adjudications. 

Figure 1: Key Events Related to the Security Clearance Reform Effort: 

[Refer to PDF for image: time line] 

December 17, 2004: 
Intelligence Reform and Terrorist Prevention Act passed. 

January 2005: 
Government Accountability Office places Department of Defense’s 
clearance program on its high-risk list. 

June 27, 2005: 
Executive Order 13881 designates the Office of Management and Budget 
the single entity to ensure centralization, uniformity, and 
reciprocity of security clearance policies. 

November 2005: 
Office of Management and Budget issues a plan for improving the 
security clearance process. 

June 25, 2007: 
The Joint Reform Team is formed to develop a plan for clearance 
reform, including research priorities and an information technology 
strategy, to achieve IRTPA goals. 

April 30, 2008: 
The Joint Reform Team issues a report on reforming the security 
clearance and suitability process. 

December 18, 2008: 
The Joint Reform Team issues a report outlining reform progress and 
further plans. 

June 30, 2008: 
Executive Order 13467 establishes the Performance Accountability 
Council to drive implementation of the reform effort and designated 
the Office of Management and Budget’s Deputy Director for Management 
as Chair. 

March 17, 2009: 
The Joint Reform Team issues an Enterprise Information Technology 
Strategy to support the reformed security and suitability process. 

February 16, 2010: 
The Performance Accountability Council issues a strategic framework to 
articulate the goals of the security and suitability process reform. 

May 31, 2010: 
The Performance Accountability Council develops quality measures[A] 
that it believes will identify specific quantifiable targets linked to 
goals that are intended to be measured objectively and ultimately 
gauge progress and assess the quality of the personnel security 
clearance process. 

Source: GAO analysis. 

[A] The Quality Measures are proposed measures. 

[End of figure] 

Significant Overall Progress Has Been Made to Improve Timeliness, but 
Some Executive Agencies Continue to Face Challenges in Meeting 
Timeliness Objectives: 

Timeliness Varies Across Agencies: 

The government has reported that significant overall progress has been 
made to improve the investigation and adjudication of personnel 
security clearance applications in a timely manner. This is largely 
attributable to DOD, whose clearances comprise a vast majority of 
governmentwide initial clearances. IRTPA required the executive branch 
to develop a plan under which, to the extent practical, each 
authorized adjudicative agency would be required to make a 
determination on at least 90 percent of initial security clearances 
within an average of 60 days by December 17, 2009.[Footnote 36] Within 
this 60-day period, IRTPA also includes periods of 40 days for 
investigations and 20 days for adjudications.[Footnote 37] As can be 
seen in figure 2, according to the Performance Accountability 
Council's February 2010 annual report to Congress,[Footnote 38] during 
the first quarter of fiscal year 2010, two agencies--the National 
Geospatial-Intelligence Agency and the National Reconnaissance Office--
met the timeliness requirement for investigations, seven agencies--the 
Departments of Defense, Energy, Health and Human Services, the Defense 
Intelligence Agency, the National Security Agency, the Federal Bureau 
of Investigation, and the Department of State--met the timeliness 
objectives for adjudications, and five agencies--the Department of 
Defense, Department of Energy, the National Geospatial-Intelligence 
Agency, the National Reconnaissance Office, and the Department of 
State--met the 60-day IRTPA timeliness objective.[Footnote 39] 
Furthermore, we found that one of the agencies included in our review--
the National Geospatial-Intelligence Agency--met all of the IRTPA 
timeliness objectives for the second and third quarter, while the 
Defense Intelligence Agency met all of the IRTPA timeliness objectives 
in the second quarter and DOD, which comprises the vast majority of 
clearances, and the Federal Bureau of Investigation, met all of the 
IRTPA timeliness objectives in the third quarter of fiscal year 2010. 

We also found that timeliness varied widely among executive branch 
agencies. During the first three quarters of fiscal year 2010, the 
average for the fastest 90 percent of cases adjudicated by the 14 
agencies included in our review ranged from 22 to 96 days for 
investigation timeliness, 2 to 59 days for adjudication timeliness, 
and 30 to 154 days for IRTPA timeliness.[Footnote 40] Agency officials 
that we spoke with largely attributed the wide variation between these 
agencies to variances in the adoption of information technology. 
According to OPM officials, timeliness varies for the agencies that 
use OPM as the investigative service provider due, in part, to 
differences in agency adoption of information technology, such as the 
e-QIP that speeds up investigation timeliness by providing OPM with 
more complete and better quality data earlier in the process.[Footnote 
41] With regard to adjudication timeliness, five of the agencies we 
included in our review have developed electronic delivery, electronic 
adjudication, or case management and workflow tools to improve 
timeliness, while others have not. 

Figure 2: Timeliness for the First Three Quarters of Fiscal Year 2010: 
Average of the Fastest 90 Percent of Initial Clearance Cases for 
Select Executive Branch Agencies: 

[Refer to PDF for image: illustrated table] 

No delegated authority[A]: 

Department of Defense[B]: 
Investigations (40 days): 
First quarter: 42 days; 
Second quarter: 45 days; 
Third quarter: [Check]; 
Adjudication (20 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]; 
Combined (60 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]. 

Department of Homeland Security: 
Investigations (40 days): 
First quarter: 48 days; 
Second quarter: 51 days; 
Third quarter: 49 days; 
Adjudication (20 days): 
First quarter: 48 days; 
Second quarter: 59 days; 
Third quarter: 57 days; 
Combined (60 days): 
First quarter: 96 days; 
Second quarter: 110 days; 
Third quarter: 106 days. 

Department of Energy: 
Investigations (40 days): 
First quarter: 47 days; 
Second quarter: 45 days; 
Third quarter: 44 days; 
Adjudication (20 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]; 
Combined (60 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]. 

Department of Justice: 
Investigations (40 days): 
First quarter: 60 days; 
Second quarter: 68 days; 
Third quarter: 63 days; 
Adjudication (20 days): 
First quarter: 42 days; 
Second quarter: 44 days; 
Third quarter: 28 days; 
Combined (60 days): 
First quarter: 102 days; 
Second quarter: 112 days; 
Third quarter: 91 days. 

Department of the Treasury: 
Investigations (40 days): 
First quarter: 54 days; 
Second quarter: 56 days; 
Third quarter: 52 days; 
Adjudication (20 days): 
First quarter: 54 days; 
Second quarter: 27 days; 
Third quarter: 46 days; 
Combined (60 days): 
First quarter: 108 days; 
Second quarter: 83 days; 
Third quarter: 98 days. 

Department of Health and HUman Services: 
Investigations (40 days): 
First quarter: 52 days; 
Second quarter: 53 days; 
Third quarter: 47 days; 
Adjudication (20 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]; 
Combined (60 days): 
First quarter: 65 days; 
Second quarter: 70 days; 
Third quarter: [Check]. 

Department of Veterans Affairs: 
Investigations (40 days): 
First quarter: 54 days; 
Second quarter: 78 days; 
Third quarter: 70 days; 
Adjudication (20 days): 
First quarter: 31 days; 
Second quarter: [Check]; 
Third quarter: 26 days; 
Combined (60 days): 
First quarter: 85 days; 
Second quarter: 93 days; 
Third quarter: 96 days. 

Delegated authority[A]: 

Defense Intelligence Agency: 
Investigations (40 days): 
First quarter: 55 days; 
Second quarter: [Check]; 
Third quarter: 49 days; 
Adjudication (20 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]; 
Combined (60 days): 
First quarter: 80 days; 
Second quarter: 68 days; 
Third quarter: 78 days. 

National Security Agency[C]: 
Investigations (40 days): 
First quarter: 70 days; 
Second quarter: 59 days; 
Third quarter: 49 days; 
Adjudication (20 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]; 
Combined (60 days): 
First quarter: 80 days; 
Second quarter: 68 days; 
Third quarter: [Check]. 

National Geospatial-Intelligence Agency; 
Investigations (40 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]; 
Adjudication (20 days): 
First quarter: 31 days; 
Second quarter: [Check]; 
Third quarter: [Check]; 
Combined (60 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]. 

Central Intelligence Agency: 
Investigations (40 days): 
First quarter: 78 days; 
Second quarter: 85 days; 
Third quarter: 96 days; 
Adjudication (20 days): 
First quarter: 49 days; 
Second quarter: 47 days; 
Third quarter: 58 days; 
Combined (60 days): 
First quarter: 127 days; 
Second quarter: 132 days; 
Third quarter: 154 days. 

Federal Bureau of Investigations: 
Investigations (40 days): 
First quarter: 76 days; 
Second quarter: 75 days; 
Third quarter: [Check]; 
Adjudication (20 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]; 
Combined (60 days): 
First quarter: 82 days; 
Second quarter: 78 days; 
Third quarter: [Check]. 

National Reconnaissance Office: 
Investigations (40 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]; 
Adjudication (20 days): 
First quarter: 31 days; 
Second quarter: 58 days; 
Third quarter: 36 days; 
Combined (60 days): 
First quarter: [Check]; 
Second quarter: 85 days; 
Third quarter: 62 days. 

Department of State: 
Investigations (40 days): 
First quarter: 43 days; 
Second quarter: 47 days; 
Third quarter: 48 days; 
Adjudication (20 days): 
First quarter: [Check]; 
Second quarter: [Check]; 
Third quarter: [Check]; 
Combined (60 days): 
First quarter: [Check]; 
Second quarter: 54 days; 
Third quarter: [Check]. 

Source: Performance Accountability Council data. 

[Note: The Data provided by the Performance Accountability Council was 
provided in August 2010. We assessed the reliability of the data and 
determined that the data are sufficiently reliable for the purposes of 
our report. 

[A] Agencies without delegated authority rely on OPM to conduct their 
background investigations while agencies with delegated authority have 
been authorized to conduct their own background investigations. As 
such, timeliness data for agencies without delegated authority is a 
reflection of OPM's timeliness. 

[B] DOD cases account for a vast majority of clearances. The 
Performance Accountability Council timeliness reports on initial 
clearances include DOD secret/confidential renewal cases. A prior GAO 
review and OPM officials' estimates of DOD clearance timeliness in 
fiscal year 2009 indicated that confidential and secret level 
clearances, whether initial or renewal, generally took the same amount 
of time to investigate. Furthermore, the Defense Personnel Security 
Research Center--a Department of Defense entity dedicated to improving 
the effectiveness, efficiency, and fairness of the DOD personnel 
security system--issued a working paper that showed that average 
adjudication timeliness did not substantially differ between initial 
and renewal secret clearance cases for DOD using first, second, and 
third quarter data for fiscal year 2008. 

[C] According to National Security Agency officials, due to the nature 
of the National Security Agency's initiation and investigation 
requirements, reported investigation times include additional steps, 
such as suitability determination investigations. 

[End of figure] 

Agencies Have Made Efforts to Improve Timeliness for Processing 
Security Clearances: 

The requirements established by IRTPA have resulted in a 
governmentwide focus on improving the timeliness of initial security 
clearances through the Performance Accountability Council. In 
addition, several of the agency officials with whom we spoke reported 
that their agencies prioritize timeliness for security clearances. For 
example, several agency officials noted that the passage of IRTPA was 
an important factor leading to continued senior level leadership 
commitment, involvement, and oversight over timeliness reform through 
the Performance Accountability Council. Moreover, IRTPA's annual 
reporting requirements have provided more information about agency 
timeliness to Congress, allowing for more oversight and increasing 
transparency and accountability. However, IRTPA does not set 
timeliness requirements for suitability determinations, Homeland 
Security Presidential Directive-12 investigations,[Footnote 42] and 
security clearance renewals. According to agency officials we spoke 
to, their agencies often prioritize initial security clearances for 
processing. 

Governmentwide efforts to improve the timeliness of personnel security 
clearance processing have focused on technology solutions. For 
example, the Joint Reform Team and the Performance Accountability 
Council have encouraged agencies to utilize information technology 
solutions, such as e-QIP, electronic delivery, and electronic 
adjudication capabilities to enhance automation.[Footnote 43] E-QIP 
facilitates more complete collection of a subject's information 
upfront in the process and reduces errors, which lowers, on average, 
the time it takes for investigators to clarify the information 
provided. Electronic delivery reduces the adjudicative phase by 
eliminating delays in receiving investigative reports related to mail 
and courier services, such as the need at certain agencies to 
irradiate all incoming mail. Electronic adjudication systems use 
automation to review investigative reports for missing information and 
adjudicate the cases, under certain conditions, within seconds. Agency 
officials indicated that as agencies have adopted these capabilities, 
timeliness improved. In addition, OPM, which performs approximately 94 
percent of initial clearance investigations for the federal 
government, has also taken steps to improve timeliness. For example, 
according to OPM officials, OPM also made information technology 
enhancements to improve its processes, such as enabling electronic 
delivery. 

Aside from these governmentwide efforts, some agency officials stated 
that their agencies have taken steps to improve adjudication 
timeliness. DOD, for example, developed and implemented an electronic 
case management system--the Clearance Adjudication Tracking System-- 
within several of its Central Adjudication Facilities.[Footnote 44] In 
2009, the Army began electronically adjudicating secret clearances 
through the Clearance Adjudication Tracking System, which was a 
significant factor in improving the Army's adjudicative average 
timeliness. For example, according to the Performance Accountability 
Council's Strategic Framework, the average of the fastest 90 percent 
of initial clearance adjudications for the Army fell from 187 days in 
the second quarter of fiscal year 2009 to 10 days in the first quarter 
of fiscal year 2010. The Department of Energy also took steps to 
enhance timeliness. For example, in addition to utilizing electronic 
delivery and e-QIP, the Department of Energy developed corrective 
action plans, implemented case prioritization procedures, and created 
a tiered adjudication structure to clear easier cases quickly while 
utilizing a complex case review board to address complex cases in a 
timely manner. In addition, the Department of Energy built timeliness 
performance into adjudicator evaluations, reduced the number of people 
involved with deciding cases, and increased manpower to meet workload 
requirements. 

Agencies Continue to Face Several Challenges to Meeting Timeliness 
Objectives: 

Despite the actions that have been taken to improve timeliness, agency 
officials with whom we spoke identified several remaining challenges 
to meeting IRTPA's timeliness objectives. These challenges include 
agency-specific issues, such as resource constraints and manpower 
limitations. For example: 

* Resource constraints are a limiting factor for several agencies in 
implementing certain information technology capabilities, such as 
electronic delivery, case management, and workflow tools. For example, 
Defense Intelligence Agency officials indicated that they are 
constrained in implementing a key information technology that provides 
electronic delivery, case management, and workflow tool capabilities. 
Furthermore, some agencies, especially those with relatively small 
clearance caseloads, find it difficult to justify large investments to 
develop and implement information technology systems. 

* Personnel limitations, such as personnel shortages or increased 
workloads, were also identified by several agency officials as an 
ongoing challenge. Some agency officials stated that their agencies 
already have or expect to experience personnel shortages. For example, 
officials from the Department of Homeland Security stated that a lack 
of resources is the primary issue for not meeting the timeliness 
objectives, but the Department of Homeland Security headquarters is 
currently backfilling 10 vacant adjudicator positions, which should 
help to alleviate the problem. In addition, some agency officials 
stated that their agency staff is subject to workload increases, such 
as periods of increased agency hiring, spikes in security clearance 
renewal cases, or additional duties related to corollary requirements. 
For example, in 2008, Homeland Security Presidential Directive-12 
directed the implementation of a common governmentwide identification 
standard for federal employees and contractors, under which federal 
agencies have been required to begin issuing common identification and 
access badges for all individuals, including contractors, who need 
access to government facilities or computer networks. These badge 
requirements, while different from those required for security 
clearances, expanded the pool of staff needing investigations and 
adjudicative determinations. These issues are particularly challenging 
in places where staff already perform clearance processes as a 
collateral duty. 

We found other challenges to meeting timeliness objectives that were 
the result of systemic issues involving interagency and 
intergovernmental activities. Agencies are often unable to control 
certain processes in order to meet timeliness objectives when they are 
dependent on information or action from other governmental entities. 
For example: 

* Information-sharing between agencies is an ongoing challenge that 
can manifest itself in several ways. First, investigative agencies are 
not in direct control of the timeliness and completeness of Federal 
Bureau of Investigation, state, and local law enforcement fingerprint 
and criminal investigation checks. For example, the results of Federal 
Bureau of Investigation criminal investigation checks often are 
returned with a classification listed as "No Pertinent," which 
indicates that there is no pertinent information relevant to making a 
clearance eligibility determination. Some agency officials with whom 
we spoke indicated that this type of response leaves adjudicators with 
incomplete information due to the potential that the designation is 
either the result of a subjective judgment from an outside party as to 
what they believe is relevant information or a placeholder to indicate 
that more information is potentially available, but pending or not 
releasable. Second, officials said the lack of digitization of records 
at certain federal, state, and local agencies can be a challenge to 
gathering information for timely completion of investigations and 
adjudicative decisions. When personnel files, for example, are not 
stored, catalogued, and made searchable through electronic means, 
agencies are limited by manual checks. Finally, delays and incomplete 
information may occur in obtaining information from intelligence 
agencies. For example, some agency officials with whom we spoke stated 
that since they do not have direct access to clearance-related 
information and databases for agencies in the Intelligence Community, 
they rely upon manual requests for information. 

* Investigation services quality and cost is an ongoing challenge to 
meeting timeliness objectives, according to agencies officials. For 
example, officials representing the Departments of Homeland Security, 
Energy, the Treasury, Justice, and four DOD component agencies 
[Footnote 45] that utilize OPM as their investigative service provider 
cited challenges related to deficient investigative reports as a 
factor that slows agencies' abilities to make adjudicative decisions. 
The quality and completeness of investigative reports directly affects 
adjudicator workloads, including whether additional steps are required 
before adjudications can be made, as well as agency costs. For 
example, some agency officials we spoke with noted that OPM 
investigative reports do not include complete copies of associated 
police reports and criminal record checks. According to ODNI and OPM 
officials, OPM investigators provide a summary of police and criminal 
reports and assert that there is no policy requiring inclusion of 
copies of the original records. However, ODNI officials also stated 
that adjudicators may want or need entire records as critical elements 
may be left out. For example, according to Defense Office of Hearings 
and Appeals officials, in one case, an investigator's summary of a 
police report incorrectly identified the subject as a thief when the 
subject was actually the victim. If the Defense Office of Hearings and 
Appeals had access to actual police documents, officials believe the 
adjudication process would be more efficient. We noted in our prior 
work that documentation was incomplete for most OPM-provided 
investigative reports based on independent review of about 3,500 
investigative reports.[Footnote 46] We also noted in our previous work 
that incomplete investigative documentation may lead to increases in 
the time it takes to complete the clearance process and the overall 
costs of the process.[Footnote 47] Several agency officials stated 
that in order to avoid further costs or delays they often choose to 
perform additional steps internally to obtain missing information, 
clarify or explain issues identified in investigative reports, or 
gather evidence for issue resolution or mitigation. 

Finally, a significant challenge to meeting timeliness objectives 
specific to Intelligence Community agencies involve addressing the 
requirements that are unique to these agencies. For example, since 
most positions in Intelligence Community agencies require top secret 
clearances with Sensitive Compartmented Information access, 
intelligence agencies rely almost exclusively on Single Scope 
Background Investigations that are required for these types of 
clearances. These investigations have higher requirements for the 
types and numbers of sources of information required compared to 
investigations for secret or confidential clearances. According to 
agency officials, these higher requirements take longer, on average, 
to investigate and adjudicate. In addition, timeliness for 
intelligence agencies is often complicated by the unique issues 
presented by extensive suitability determination processes and precise 
conditions of employment that may include medical exams, psychological 
evaluations, drug testing, and polygraph exams. Polygraph exams, for 
example, may generate additional leads that require further 
investigative work. Moreover, agency officials also stated that 
scheduling a polygraph with an individual, especially if they live far 
from agency offices, may add months to investigation timelines. 

Performance Accountability Council Has Not Reported on Impediments to 
Meeting Timeliness Objectives or Plans to Address Impediments: 

While the Performance Accountability Council, responsible for driving 
implementation of the reform effort and ensuring accountability, has 
taken steps to assist in implementation of reform efforts, it has not 
reported on the impediments to meeting timeliness objectives or plans 
to address impediments. IRTPA's security clearance reform provision 
requires annual reports to the appropriate congressional committees-- 
through 2011--on the progress made during the preceding year toward 
meeting its requirements, including timeliness data and a discussion 
of any impediments to the smooth and timely functioning of its 
requirements. However, in its most recent report to Congress, the 
Performance Accountability Council did not provide information on the 
impediments agencies face in meeting timeliness objectives or plans to 
address impediments. While the Office of the Director of National 
Intelligence, in its capacity as Security Executive Agent, has 
performed a limited number of oversight audits, according to officials 
at four agencies we met with, the Performance Accountability Council 
has not met with them to identify the impediments to meeting the 
timeliness objectives. The Performance Accountability Council has 
focused its efforts on DOD in part due to DOD's security clearance 
program's designation as one of GAO's high-risk areas, as well as the 
fact that DOD clearances comprise the overwhelming majority of initial 
clearance cases that are processed annually. We found that due to the 
relative size of DOD's clearance program, DOD's progress towards 
meeting IRTPA's timeliness objectives is a significant factor in 
reducing the average time required for initial security clearance 
processing for the government as a whole. Furthermore, Performance 
Accountability Council officials stated that they will begin 
conducting one-on-one meetings with individual agencies in September 
2010 to enhance communication, assist in implementation planning, and 
provide a feedback mechanism for agency stakeholders to communicate 
information and needs to the Joint Reform Team. 

The Performance Accountability Council is in a position to identify 
certain trends and commonalities, such as those challenges related to 
resource constraints, manpower limitations, information-sharing, 
investigation services quality and cost, and Intelligence Community 
specific issues. However, absent complete reporting on the impediments 
on meeting timeliness objectives, Congress may not have visibility 
over agency compliance and decision makers may not have a complete 
picture of the progress made or the impediments to meeting timeliness 
objectives. This potential lack of agency transparency and 
accountability may impact continued efforts to improve timeliness and 
prevent scrutiny over agencies that are not meeting timeliness 
objectives. 

Executive Agencies Often Grant Reciprocity, Although Challenges Exist 
to Measuring and Tracking Reciprocity: 

Executive Agency Officials Reported That They Routinely Honor Another 
Agency's Security Clearance, but Additional Steps May Be Taken before 
Granting Reciprocity: 

Officials representing executive branch agencies, including those 
within the Intelligence Community, stated that they routinely grant 
reciprocity (i.e., accept a background investigation or clearance 
determination completed by another authorized investigative or 
adjudicative agency). IRTPA generally requires that all security 
clearance investigations and determinations be accepted by all 
agencies, with limited exceptions when necessary for national security 
purposes. We have reported in the past that, according to the 
government's plan for addressing problems in the personnel security 
clearance process, security clearances are not fully accepted 
governmentwide.[Footnote 48] A recent congressional committee report 
also suggests that even among the elements of the Intelligence 
Community, there are impediments and sometimes lengthy delays in 
granting clearances to employees detailed from one agency to another. 
[Footnote 49] However, in October 2008, the ODNI issued guidance on 
the reciprocity of personnel security clearances.[Footnote 50] The 
guidance requires, except in limited circumstances, that all 
Intelligence Community elements "accept all in-scope security 
clearance or access determinations." Further, OMB guidance[Footnote 
51] requires agencies to honor a clearance when: (1) the prior 
clearance was not granted on an interim or temporary basis, (2) the 
prior clearance investigation is current and in-scope,[Footnote 52] 
(3) there is no new derogatory information, and (4) there are no 
conditions, deviations, waivers, or unsatisfied additional 
requirements (such as polygraphs) if the individual is being 
considered for access to highly sensitive programs.[Footnote 53] 
Moreover, officials representing two agencies in our review noted that 
it is in their best interest to accept a prior clearance because 
reciprocity saves time, money, or manpower. 

Although officials agreed that they routinely honor another agency's 
security clearance, we found that some agencies find it necessary to 
take additional steps to address limitations with available 
information. Officials representing 18 of the 21 organizations we met 
with to discuss reciprocity reported that they must address 
limitations, such as insufficient information in the databases or 
variances in the scope of investigations, before granting reciprocity. 
For example: 

* Insufficient information. Although there is no single, integrated 
database, security clearance information is shared between OPM, DOD, 
and, to some extent, Intelligence Community databases. OPM has taken 
steps to ensure certain clearance data necessary for reciprocity is 
available to adjudicators. For example, in April 2010, OPM held an 
interagency meeting to determine new data fields to include in their 
shared database to more fully support reciprocity. However, we found 
that the shared information available to adjudicators contains summary-
level detail that may not be complete. As a result, agencies may take 
steps to obtain additional information, which creates challenges to 
immediately granting reciprocity. For example, to accept a clearance 
granted by an intelligence agency, a non-intelligence agency must 
access information from the intelligence agencies' Scattered Castles 
database. However, according to officials representing the Department 
of the Treasury, the Department of Justice, and the Joint Chiefs of 
Staff, the Scattered Castles database does not always provide enough 
detail to immediately grant reciprocity. According to these officials, 
the Scattered Castles summary screen is not detailed enough or does 
not include key information, such as the steps taken to mitigate 
negative issues. As a result, additional information, such as copies 
of the original background investigation, must be sought directly from 
intelligence agencies to verify and provide supporting detail to the 
information available in Scattered Castles. Similarly, to accept a 
clearance granted by a non-intelligence agency, an intelligence agency 
must access information from non-intelligence agency databases. 
Officials representing Intelligence Community agencies with whom we 
spoke noted, for example, that they must contact DOD to determine if 
an actual clearance was granted and verify the current status of the 
applicant because such detail is not available in DOD's Joint 
Personnel Adjudication System. Similarly, officials representing the 
Department of Justice told us that while OPM's Central Verification 
System shows the existence of conditions, deviations, and waivers, 
Department of Justice officials follow up as appropriate with the 
agency that granted the clearance. 

* Variances in the scope of investigations. We found that the scope of 
background investigations varies by level of clearance, which may lead 
to duplicative work. For example, a person with a secret-level 
clearance may have had one of several types of background 
investigations and the scope of the background investigation may vary 
depending on the type of clearance sought. Further, officials from two 
agencies we spoke with told us that they typically require a certain 
type of background investigation and when a subject's clearance is 
based on a different type of investigation, they may take additional 
steps to fill in the missing gaps to ensure the scope is consistent 
with their expectations. Officials representing other agencies 
included in our review told us that when the subject's existing 
background investigation is different from the required investigation 
type, the agency will request a new background investigation. For 
example, officials at one agency stated that positions of public trust 
sometimes have higher suitability information requirements than 
information available from confidential/secret background 
investigations. Similarly, officials at another agency stated that 
because there are two types of investigations for secret/confidential 
clearances based on whether the person is military or contractor or 
government civilian, the agency may not be able to accept an 
investigation if it is the wrong one for that particular position. 
When an entirely new investigation is performed, we found that the 
current system may lead to duplicative work, limiting reciprocity. In 
a 2008 report to the President, the Joint Reform Team, under the 
Performance Accountability Council, proposed revised investigative 
standards to, among other things, reduce the types of initial 
investigations from 15 to 3.[Footnote 54] While originally planned for 
release in December 2010, the Performance Accountability Council 
extended plans to issue a new version of the revised Federal 
Investigative Standards to calendar year 2011. 

In addition to addressing limitations with available information, 
agency officials identified broader challenges to granting 
reciprocity. Officials representing 14 of the 21 agencies included in 
our review of reciprocity reported that challenges, such as the need 
to conduct suitability determinations or determine whether a prior 
clearance investigation and adjudication meets their quality 
expectations, must be addressed before granting reciprocity. For 
example: 

* Conducting suitability determinations. All federal agencies may be 
required to conduct basic suitability determinations to ensure the 
applicant's character or conduct is appropriate for the position in 
question, but some agencies take additional actions to determine 
suitability before they reciprocate a security clearance. For example, 
the Department of Justice must take steps to ensure that applicants 
for jobs with the Drug Enforcement Administration have not used drugs, 
according to agency officials. Similarly, the Intelligence Community 
requires a polygraph evaluation, among other things, to determine 
suitability for most positions, according to intelligence officials. 
We also found that agencies have varying standards for determining 
suitability of applicants before reciprocating a security clearance. 
For example, Department of Health and Human Services officials said 
they will not accept a prior security clearance until it makes a 
favorable determination of suitability. Similarly, the Department of 
Justice will only accept another agency's clearance and hire the 
applicant on a probationary period pending a favorable suitability 
determination. As a result of the variances in determining 
suitability, OPM, as the Suitability Executive Agent for all executive 
agencies, and the Joint Reform Team have issued guidance in line with 
Executive Order 13488, which mandates, to the extent practicable and 
with certain exceptions, reciprocal recognition of prior favorable 
suitability determinations.[Footnote 55] For example, OPM issued a 
memorandum for the Heads of Executive Departments and Agencies that 
explains how to implement the Executive Order.[Footnote 56] 

* Determining whether a prior clearance investigation and adjudication 
meets standards. Most agency officials we spoke with stated that since 
there is no governmentwide standardized training and certification 
process for investigators and adjudicators, a subject's prior 
clearance investigation and adjudication may not meet the standards of 
the inquiring agency. Although OPM has developed some training, 
security clearance investigators and adjudicators are not required to 
complete a certain type or number of classes. As a result, the extent 
to which investigators and adjudicators receive training varies by 
agency. For example, according to ODNI officials, all DOD adjudicators 
working at DOD Central Adjudication Facilities must take a basic 2-
week adjudicator course and subsequently the 1-week advanced course 
after some time on the job. However, according to officials we spoke 
with, the Air Force has an additional requirement for adjudicators to 
attend a 3-week training course while the Defense Industrial Security 
Clearance Office relies on on-the-job training. Other agencies have 
different requirements. For example, the Department of Energy relies 
on a mandatory annual security refresher. Consequently, as we have 
previously reported, agencies are reluctant to be accountable for 
investigations and/or adjudications conducted by other agencies or 
organizations.[Footnote 57] To achieve fuller reciprocity, clearance- 
granting agencies seek to have confidence in the quality of prior 
investigations and adjudications. The annual reports to Congress 
indicate that the Performance Accountability Council is taking steps 
to make investigations and adjudications more consistent across the 
government by standardizing the training of investigators and 
adjudicators.[Footnote 58] For example, the reports describe the 
development of core courses, as well as a formalized certification for 
investigators and adjudicators. According to senior leaders of the 
reform effort, these steps will facilitate reciprocal acceptance of 
clearance decisions governmentwide. 

In the Absence of Consistent Metrics and Reporting Requirements, the 
Extent to Which Reciprocity Is Granted Is Unknown: 

Although agency officials have stated that reciprocity is regularly 
granted, agencies do not have complete records on the extent to which 
previously granted security clearance investigations and adjudications 
are honored governmentwide. While the Performance Accountability 
Council has identified reciprocity as a governmentwide strategic goal, 
we found that agencies do not consistently and comprehensively track 
when reciprocity is granted, and lack a standard metric for tracking 
reciprocity. For example, Department of Justice and Department of 
Energy officials said they track both when reciprocity is granted and 
reasons for denying a previously granted security clearance, while 
Navy and Department of the Treasury officials said they only document 
when reciprocity is granted and not when reciprocity is denied. The 
Navy checks a box in its electronic database, and the Department of 
Energy and the Department of the Treasury manually track when 
reciprocity is honored. In contrast, the Army and Air Force do not 
track reciprocity at all, according to agency officials. Moreover, it 
is unclear the extent to which agencies that do track reciprocity are 
reporting the data to oversight agencies, such as ODNI, or sharing 
information on reciprocity with each other.[Footnote 59] 

OPM and the Performance Accountability Council have developed quality 
metrics for reciprocity, but the metrics do not measure the extent to 
which reciprocity is being granted. We previously reported that 
developing metrics for assessing and regularly monitoring all aspects 
of the clearance process could add value in current and future reform 
efforts as well as supply better information for greater congressional 
oversight.[Footnote 60] While the existing metrics are a positive 
step, more is needed to comprehensively capture the extent to which 
reciprocity is being granted. For example, OPM created a metric in 
early 2009 to track reciprocity, but this metric measures limited 
information. OPM's metric measures the number of investigations 
requested from OPM that are rejected based on the existence of a 
previous investigation and does not track the number of cases in which 
reciprocity was or was not successfully honored. The Performance 
Accountability Council developed quality metrics, including metrics to 
track reciprocity, in response to a March 2010 congressional inquiry. 
For example, the Performance Accountability Council proposes as a 
metric the average percentage of cases for which prior database checks 
are conducted as reported by executive branch agencies. However, this 
metric does not account for agencies that checked other databases and 
relies on agency self-reporting rather than a systematic method of 
data collection. Although the metric helps to create an overall 
picture of reciprocity, it does not track which cases were and were 
not reciprocated. Similarly, the other metrics included in the 
Performance Accountability Council's proposal, such as the number of 
duplicate requests for investigations, percentage of applications 
submitted electronically, number of electronic applications submitted 
by applicant but rejected by OPM as unacceptable due to missing 
information or forms, and percentage of fingerprint submissions 
determined to be "unclassifiable" by the Federal Bureau of 
Investigation, provide useful information, but do not track the extent 
to which reciprocity is or is not ultimately honored. 

Without comprehensive, standardized metrics to track reciprocity and 
consistent documentation of the findings, decision makers will not 
have a complete picture of the extent to which reciprocity is granted 
or the challenges that agencies face when attempting to honor 
previously granted security clearances: 

Although There Are No Plans to Develop a Single, Integrated Database, 
Steps Have Been Taken to Upgrade Existing Systems and Increase 
Information Sharing: 

The Executive Branch Has Opted to Leverage Existing Systems in Lieu of 
a Single, Integrated Database: 

Tasked with establishing a single, integrated database, the executive 
branch has opted to focus on leveraging existing systems rather than 
establish a new database. IRTPA required that not later than 12 months 
after the date of enactment of the act, the Director of the Office of 
Personnel Management and the Director of the Office of Management and 
Budget establish and commence operating and maintaining a single, 
integrated database of security clearance information. This database 
was to house information regarding the granting, denial, or revocation 
of security clearances or access pertaining to military, civilian, and 
contractor personnel, from all authorized investigative and 
adjudicative agencies.[Footnote 61] Information from this database 
would be used to validate whether a person has or had a clearance, 
potentially including such information as the type of investigation 
that was conducted and the date of the investigation, thereby 
assisting responsible officials in determining whether a new 
investigation is required. However, the Performance Accountability 
Council is not pursuing a single, integrated database according to our 
analysis of a series of recent reports that the Joint Reform Team, 
under the Performance Accountability Council, issued between 2008 and 
2010.[Footnote 62] For example, according to the Enterprise 
Information Technology Strategy, the Performance Accountability 
Council has opted to pursue an approach that leverages existing 
systems and involves the development of new tools when necessary. 
[Footnote 63] According to the Strategic Framework, which was included 
with the most recent annual report to Congress, the reform efforts are 
focused on leveraging OPM's existing system--the Central Verification 
System--to enable access to records on investigations and 
adjudications.[Footnote 64] Agency officials from both OPM and ODNI 
confirmed that there are no plans to create a new single, integrated 
database. Instead, the focus will be on using a single search 
capability of existing databases as the means by which they intend to 
address the IRTPA requirement. According to an OPM official with whom 
we spoke, a single database would not provide any additional 
functionality over the single-search capability that they are pursuing. 

OPM, DOD, and ODNI officials with whom we spoke explained that 
establishing, operating, and maintaining a single, integrated database 
is not a viable option due to concerns related to privacy, security, 
and data ownership. First, DOD and OPM mentioned privacy concerns, 
which involve the unintentional disclosure of personal identifying 
information, such as name and Social Security number.[Footnote 65] 
Second, merging the different systems into one database raises 
security concerns. For example, according to an ODNI official, since 
the Intelligence Community's database is classified and separate from 
the databases used by non-intelligence agencies, even an aggregation 
of unclassified information from its database could lead to 
unintentional disclosure of personal identifying information that 
could compromise security. Moreover, breaches in the system could also 
compromise security. For example, some officials mentioned an enhanced 
threat from hackers if there were consolidation of multiple 
information technology systems. Finally, according to DOD officials, 
there are issues related to data ownership and the copying and 
transferring of information between systems that are owned by 
different agencies. For example, according to OPM officials, OPM can 
not provide information from investigations it did not conduct to 
another agency. When investigations are conducted by agencies with 
delegated authority, the reports are owned and maintained by the 
investigating agency. Requests for these investigative records must be 
referred to the owning agency. 

Information from Two Primary Databases Can Be Accessed from a Single 
Entry Point: 

Although there are no plans to create a new governmentwide database, 
non-intelligence agencies in our review are sharing information about 
personnel who hold or are seeking security clearances through two main 
databases that can be accessed through a single entry point. Two 
primary databases are used by non-intelligence agencies to store 
investigative and adjudicative information and according to the 
Performance Accountability Council, they account for decisions on 
about 90 percent of all security clearance holders in the federal 
government. Data are stored in either OPM's Central Verification 
System or DOD's Joint Personnel Adjudication System. The Central 
Verification System includes security clearance data for all non-
Intelligence Community, non-DOD executive branch agencies. The Joint 
Personnel Adjudication System is a repository for security clearance 
information on both DOD civilian and military personnel, as well as 
determinations of contractor clearance eligibility and access for the 
National Industrial Security Program. Data from the two databases can 
be searched and obtained from a single entry point in the Central 
Verification System.[Footnote 66] 

The Central Verification System was upgraded in spring 2010 and now 
provides access to more information than was previously accessible. 
Specifically, the upgraded system provides users with a summary of 
information on: 

* Characteristics of clearances reported to the system. This summary 
includes information on active, inactive, and denied clearances, as 
well as information on whether there is a condition, deviation, or 
waiver.[Footnote 67] 

* Characteristics of investigations reported to the system. This 
summary includes information on pending, closed, and discontinued 
investigations, as well as requests that were deemed unacceptable due 
to inadequate or inaccurate information. 

* Suitability and fitness. This summary provides information on 
adjudication decisions for suitability for federal employees and 
fitness for excepted service and contract employee determinations. 
[Footnote 68] 

* Homeland Security Presidential Directive-12 Personal Identification 
Verification Credentials.[Footnote 69] This summary includes 
information on the status of credentials issued to the subject 
indicating whether the credentials are active, suspended, revoked, 
administratively withdrawn, or other. 

* Polygraph data. This summary includes information on the type of 
polygraph conducted, including Counter-Intelligence or Expanded Scope, 
but does not include results from examinations.[Footnote 70] 

Intelligence Community Agencies Share Information through a Separate 
Database and Are Exploring Alternatives to Expand Information Sharing 
with Non-intelligence Agencies: 

According to ODNI officials and Intelligence Community Directive 704, 
the Intelligence Community agencies share information with one another 
through a separate classified database known as Scattered Castles. 
Scattered Castles is a repository for records from all intelligence 
agencies by which each agency uploads relevant information from 
individual agency databases. All personnel who have access to 
Sensitive Compartmented Information are listed in Scattered Castles. 
This system is not linked to OPM's Central Verification System due to 
concerns about protecting classified information. According to ODNI 
officials, the system has not been linked to non-intelligence 
databases due to the need to protect information on covert personnel. 
However, officials representing Intelligence Community agencies stated 
that they do enter some information from the Joint Personnel 
Adjudication System into Scattered Castles. 

Although the Intelligence Community maintains a separate database, we 
found that most of the non-intelligence agencies included in our 
review had some access to Scattered Castles. For example, five non- 
intelligence, non-DOD agencies included in our review had some access 
through a Sensitive Compartmented Information Facility located in 
their agency.[Footnote 71] All of the military departments, as well as 
the Joint Chiefs of Staff, also had some access.[Footnote 72] 
Moreover, according to agency officials, DOD adjudicators with the 
appropriate clearance and need to know will have access to a Sensitive 
Compartmented Information Facility with access to Scattered Castles 
when DOD collocates all of its clearance adjudication facilities at 
Fort Meade in Maryland as part of the DOD base realignment and closure 
process in 2011. 

According to Performance Accountability Council officials, the 
Performance Accountability Council is participating in an effort to 
explore ways to enhance information sharing between the Intelligence 
Community agencies and the non-intelligence agencies. A working group 
has been established to study alternatives to support a single access 
point from which to search clearance information and plans to complete 
its review in December 2010. According to an ODNI official, 
alternatives currently being considered include a help desk staffed 
with employees from the Intelligence Community who would have access 
to the Joint Personnel Adjudication System, Central Verification 
System, and Scattered Castles and could, upon request, provide the 
results of Scattered Castles searches to non-Intelligence Community 
agencies. 

Conclusions: 

Continued personnel security clearance reform relies on strong, 
committed executive leadership to sustain the momentum created by the 
current reform effort. This type of leadership commitment, in turn, 
helps provide oversight and accountability for the improvement 
processes. Key to these efforts has been the Performance 
Accountability Council, which has provided direction for clearance 
reform across the federal government. As a result of the Performance 
Accountability Council's actions, federal agencies have made progress 
in moving closer to the objectives and requirements outlined in IRTPA. 
Under the Performance Accountability Council's leadership, timeliness 
data--particularly at DOD--have improved, steps have been taken to 
improve information sharing, and there has been focus on honoring 
reciprocity of existing clearances. However, while agencies are moving 
closer to meeting the objectives and requirements of IRTPA, continued 
oversight and accountability for personnel security clearance reform 
is still needed. Specifically, executive branch agencies that are 
currently not meeting timeliness objectives may need help in 
identifying challenges and developing plans with appropriate timelines 
to overcome these obstacles. The recent activities undertaken by the 
Performance Accountability Council to assist the agencies in 
developing plans to implement the reformed approach is a step in the 
right direction. Continued reporting required by the Intelligence 
Authorization Act for Fiscal Year 2010 will also help ensure that 
momentum gained through the reform efforts will continue. However, 
without developing more comprehensive metrics to track reciprocity, 
executive branch agencies will not have a complete picture of the 
degree to which reciprocity is honored. 

Recommendations for Executive Action: 

To improve the overall personnel security reform efforts across the 
federal government, we recommend that the Deputy Director of 
Management, Office of Management and Budget, in the capacity as Chair 
of the Performance Accountability Council, take the following actions: 

* Collaborate with the agencies that are not meeting timeliness 
objectives to take the following five actions: 

* Identify challenges to timeliness; 

* Develop mitigation strategies to enable each agency to comply with 
the IRTPA timeliness objectives; 

* Set timelines for accomplishing the required actions; 

* Monitor agency progress; and: 

* Report on these plans and progress in the annual reports to Congress. 

* Develop comprehensive metrics to track reciprocity and then report 
the findings from the expanded tracking to Congress. 

Agency Comments and Our Evaluation: 

We provided a draft of our report to OMB, ODNI, and OPM. In response 
to this draft, we received oral comments from OMB and written comments 
from ODNI and OPM. All three agencies concurred with all of our 
recommendations. OMB, ODNI, DOD (through ODNI), and OPM also provided 
us with technical comments, which we incorporated in this report, as 
appropriate. ODNI and OPM's written comments are reprinted in their 
entirety in appendixes II and III, respectively. 

In oral comments, OMB generally concurred with both of our 
recommendations directed to OMB's Deputy Director of Management in the 
capacity as Chair of the Performance Accountability Council. OMB noted 
the report's thoroughness and that it highlighted the significant 
progress that has been made to improve the timeliness of security 
clearance determinations. In response to our recommendations, OMB 
described some of the steps that the Performance Accountability 
Council was taking to address the recommendations. Regarding our first 
recommendation, OMB noted that the Performance Accountability Council 
was committed to the timeliness and reciprocity goals of IRTPA and 
that it was working with agencies currently not meeting the IRTPA 
timeliness goals by taking steps to assist these agencies. Regarding 
our second recommendation to develop additional performance measures 
to track reciprocity, OMB stated that the Performance Accountability 
Council is working to develop these additional metrics. 

In written comments, ODNI and OPM both noted the significant overall 
progress that has been made in the reform efforts. Specifically, ODNI 
noted that DOD, with the majority of clearances, achieved timeliness 
goals for adjudications for fiscal year 2010. As we noted in our 
report, significant overall progress has been made, largely 
attributable to DOD because the department represents a vast majority 
of the initial clearances. 

In agreeing with and providing comments related to our 
recommendations, ODNI described a number of ongoing and future actions 
related to our recommendations. For example, ODNI stated that it is 
working through the Joint Reform Team to assist executive agencies 
that are not meeting IRTPA objectives to develop mitigation strategies 
and will report these strategies to Congress in its February 2011 
IRTPA Annual Report. Similarly, ODNI stated that it will continue to 
work with the Performance Accountability Council's Performance 
Management and Measures subcommittee to develop additional measures 
for reciprocity, timeliness, and quality, which will also be included 
in its annual report to Congress. We are encouraged to see a continued 
commitment by executive leaders of the security clearance reform 
effort and if implemented in accordance with our recommendations, the 
ODNI's actions appear to be a positive step in helping sustain the 
momentum of security clearance reform. 

In addition to agreeing with our recommendations, OPM provided four 
specific comments: 

* First, OPM provided comments on the timeliness data provided by the 
Performance Accountability Council that we used to frame agency 
compliance with IRTPA timeliness objectives. Specifically, OPM stated 
in its written comments that some of the Performance Accountability 
Council's timeliness data for the second and third quarters of fiscal 
year 2010 varies with the data that OPM collects and reports to the 
Performance Accountability Council. We acknowledge that in some 
instances there are discrepancies between the timeliness data provided 
by OPM and the timeliness data that the Performance Accountability 
Council provided to us. In some cases, OPM asserts that timeliness 
data for investigations is marginally better than reported by the 
Performance Accountability Council and in other instances, is 
marginally worse. However, none of the discrepancies reported by OPM 
affects our findings as it relates to agency compliance with IRTPA 
timeliness objectives for the period reported. Agencies we note in 
figure 2 continue to either meet or not meet the IRTPA timeliness 
goals. As we note in our methodology, for the purposes of this report, 
we ultimately selected and relied on data provided by the Performance 
Accountability Council's Subcommittee on Performance Management and 
Measures. The Performance Accountability Council is responsible for 
collecting and reporting agency timeliness data to Congress and 
providing oversight to agencies regarding the timeliness of personnel 
security clearance processes. The data were provided by the 
Performance Accountability Council in August 2010. We conducted a 
series of data reliability interviews with knowledgeable officials 
with the Performance Accountability Council's subcommittee and 
concluded that the data provided were sufficiently reliable for our 
purposes. 

* Second, OPM also provided comments related to a section of our 
report on investigation services quality and cost. Specifically, OPM 
noted in its comments that they felt some policies are ambiguous and 
that there are customer misperceptions of the sufficiency of OPM 
investigations. Further, OPM noted that there is no policy requiring 
police and criminal records to be included in its investigative 
reports. The ODNI provided a similar technical comment and we made 
changes, as appropriate, to reflect this point. However, related to 
OPM's comment on agency misperception of the sufficiency of OPM 
investigations, we spoke with, and note in our report, several 
agencies stated challenges related to deficient investigative reports 
provided by OPM. According to these agencies--including DOD, which 
constitutes the vast majority of personnel security clearances in the 
federal government--the deficiencies in investigative reports slows 
their agencies ability to make adjudicative decisions. In fact, as we 
note in this report and based on our prior work, documentation was 
incomplete for most OPM-provided investigative reports based on 
independent review of about 3,500 investigative reports provided to 
DOD.[Footnote 73] 

* Third, OPM suggested modifications to our discussion of quality 
metrics on reciprocity. In its comments, OPM noted that some of the 
metrics may have been developed prior to the Performance 
Accountability Council's response to a March 2010 congressional 
inquiry. We disagree with OPM's characterization of the accuracy of 
this section and its suggested modification for two reasons: 1) the 
Performance Accountability Council submitted proposed metrics to 
congress in May 2010 in response to the congressional inquiry we 
already note. Our evidence is derived from this letter to congress for 
which the Performance Accountability Council--including OPM--and GAO 
are signatories; and 2) OMB, in its capacity as chair of the 
Performance Accountability Council, stated in its technical comments 
that referring to the proposed metrics as originating from the 
Performance Accountability Council was appropriate. 

* Finally, OPM noted in its comments pertaining to data ownership, 
that OPM can not provide information from investigations it did not 
conduct to another agency it did not own. Instead, OPM noted that 
requests for these investigative records must be referred to the 
owning agency. As a result, we incorporated changes based on this 
comment as appropriate. 

As agreed with your office, unless you publicly announce the contents 
of this report earlier, we plan no further distribution until 12 days 
from the report date. We will then send copies of this report to the 
Senate Appropriations Committee, Senate Committee on Homeland Security 
and Governmental Affairs, Senate Select Committee on Intelligence, 
Senate Armed Services Committee, House Appropriations Committee, House 
Oversight and Government Reform Committee, and House Armed Services 
Committee and to members of the Performance Accountability Council, 
including the Director of the Office of Management and Budget, Office 
of the Director of National Intelligence, Secretary of the Department 
of Defense, and the Director of the Office of Personnel Management. In 
addition, the report will be available at no charge on the GAO Web 
site at [hyperlink, http://www.gao.gov]. 

If you or your staff have any questions about this report, please 
contact me at (202) 512-3604 or farrellb@gao.gov. Contact points for 
our Offices of Congressional Relations and Public Affairs may be found 
on the last page of this report. GAO staff who made major 
contributions to this report are listed in appendix IV. 

Signed by: 

Brenda S. Farrell: 
Director, Defense Capabilities and Management: 

[End of section] 

Appendix I: Scope and Methodology: 

Scope: 

In conducting our review of the ongoing efforts to reform the 
personnel security clearance process, the scope of work included the 
Office of Personnel Management (OPM), the Department of Defense (DOD), 
and the Office of the Director of National Intelligence (ODNI) as 
members of the Performance Accountability Council. Our review included 
select members of the Intelligence Community, including the Under 
Secretary of Defense for Intelligence, the Central Intelligence 
Agency, Defense Intelligence Agency, Federal Bureau of Investigation, 
National Geospatial-Intelligence Agency, National Reconnaissance 
Office, National Security Agency, and the Department of State. Our 
review also included six additional executive branch agencies, 
including the Departments of Energy, Health and Human Services, 
Homeland Security, Justice, the Treasury, and Veterans Affairs. These 
agencies were selected based on the volume of initial personnel 
security clearances they process per year for civilians, military, and 
industrial personnel, and their use of OPM to conduct background 
investigations. 

Methodology: 

To assess the overall personnel security clearance reform efforts, as 
well as each of our objectives, we obtained relevant documentation and 
interviewed key federal officials from the following organizations: 

* Office of Personnel Management; 

* The Department of Defense; 

* The Office of the Under Secretary of Defense for Intelligence, 

* Department of the Army, Central Clearance Facility, 

* Department of the Navy Central Adjudication Facility, 

* Department of the Air Force Central Adjudication Facility, 

* Defense Industrial Security Clearance Office Central Adjudication 
Facility, 

* Defense Intelligence Agency, 

* National Security Agency, 

* Defense Office of Hearings and Appeals, 

* Defense Personnel Security Research Center, 

* Business Transformation Agency, 

* Joint Chiefs of Staff, and: 

* Washington Headquarters Services. 

* Office of the Director of National Intelligence; 

* Department of Energy; 

* Department of Health and Human Services; 

* Department of Homeland Security; 

* Department of Justice; 

* Department of the Treasury; and: 

* Department of Veterans Affairs. 

We conducted a roundtable discussion with members of the Intelligence 
Community, including officials from the Office of the Director of 
National Intelligence, the Under Secretary of Defense for 
Intelligence, the Central Intelligence Agency, Defense Intelligence 
Agency, Federal Bureau of Investigation, National Geospatial-
Intelligence Agency, National Reconnaissance Office, National Security 
Agency, and the Department of State to discuss broader challenges the 
Intelligence Community faces regarding timeliness, information 
sharing, and reciprocity. 

To assess the extent to which executive branch agencies investigate 
and adjudicate initial personnel security clearance applications in a 
timely manner, we analyzed the timeliness objectives specified in the 
Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) and 
reviewed the self-reported timeliness data contained in the 
Performance Accountability Council's Security and Suitability Process 
Reform Strategic Framework[Footnote 74] provided by the Performance 
Accountability Council Subcommittee on Performance Management and 
Measures for the first three quarters of fiscal year 2010. The data 
provided by the Performance Accountability Council was provided in 
August 2010. Further, we obtained and reviewed timeliness data 
provided by OPM for agencies that utilize OPM as the investigative 
service provider for the first three quarters of fiscal year 2010. 
While IRTPA sets timeliness objectives for 90 percent of cases, the 
Performance Accountability Council excludes certain cases from its 
analysis before calculating and reporting on agency timeliness. For 
example, OPM officials stated that cases that are returned to OPM for 
additional work, such as work to address missing scope items, are 
excluded from timeliness data. Due to the additional investigative 
work involved with these cases and the additional time required for 
agencies to negotiate the terms of the requests, these cases take 
longer to complete. Furthermore, the Performance Accountability 
Council excludes certain cases involving industrial personnel. DOD's 
Defense Industrial Security Clearance Office adjudicates clearances 
for industrial personnel. When the Defense Industrial Security 
Clearance Office cannot mitigate issues and has decided that a denial 
or revocation is warranted, they submit the cases to the Defense 
Office of Hearings and Appeals. Timeliness information on cases 
pending with Defense Office of Hearings and Appeals is excluded from 
DOD's timeliness data. Moreover, by not including end-to-end 
timeliness information on cases that require additional work in the 
query for calculating the fastest 90 percent of cases, the Performance 
Accountability Council is excluding many of the cases that took the 
longest to complete and, therefore, the average for agency timeliness 
may be reduced. We assessed the reliability of the data by reviewing 
the existing data and interviewing agency officials knowledgeable 
about how the data was collected, stored, and reported, as well as the 
quality assurance steps that were taken to ensure completeness and 
accuracy. We determined these data were sufficiently reliable for 
purposes of our audit. Additionally, we supplemented this data 
reliability analysis with information obtained through our interviews 
with executive branch agencies about their timeliness performance in 
fiscal year 2010 to date. These agencies were selected based on the 
volume of security clearances processed annually, among other things. 
[Footnote 75] 

To assess the extent to which executive branch agencies accept 
previously granted security clearances and the challenges, if any, 
that exist related to reciprocity, we reviewed the requirements 
specified in IRTPA and analyzed Executive Orders, OMB memorandums, 
ODNI policy guidance and directives, congressional reports, and 
individual agency guidance related to reciprocity. We also analyzed 
existing and planned metrics developed by the Performance 
Accountability Council to track the extent to which reciprocity is 
honored. We met with security officials, managers, and adjudicators 
from DOD, the Intelligence Community, and a non-probability sample of 
additional executive branch agencies. We supplemented this analysis 
with information obtained from a roundtable discussion that we 
conducted with representatives of Intelligence Community agencies to 
examine the challenges these agencies face as it relates to granting 
reciprocity. Because the scope of this engagement is limited to 
security clearances, we did not analyze the extent to which agencies 
reciprocally accept prior suitability investigations and 
adjudications. For the purposes of our report reciprocity is an 
agency's acceptance of a background investigation or clearance 
determination completed by another authorized investigative or 
adjudicative agency. We excluded from the scope of our work issues 
related to access to facilities, detailed employees, or classified 
information. 

To assess the extent to which executive branch agencies share 
personnel clearance information in a single, integrated database, we 
reviewed and analyzed the Joint Reform Team's Enterprise Information 
Technology Strategy, the Performance Accountability Council's 2010 
Strategic Framework, and the two most recent Joint Reform Team 
Security and Suitability Process Reform reports.[Footnote 76] 

We interviewed knowledgeable officials within OPM, ODNI, and DOD to 
determine what, if any, limitations, barriers, or challenges existed 
in creating a single, integrated database. In addition, we received 
demonstrations of both OPM and DOD's databases and interviewed 
officials to determine how they shared information about personnel who 
hold or are seeking security clearances in the absence of a single, 
integrated database. 

We conducted this performance audit from October 2009 through November 
2010 in accordance with generally accepted government auditing 
standards. Those standards require that we plan and perform the audit 
to obtain sufficient, appropriate evidence to provide a reasonable 
basis for our findings and conclusions based on our audit objectives. 
We believe that the evidence obtained provides a reasonable basis for 
our findings and conclusions based on our objectives. 

[End of section] 

Appendix II: Comments from the Office of the Director of National 
Intelligence: 

Director Of National Intelligence: 
Washington, Dc 20511: 

November 8, 2010: 

Gene L. Dodaro: 
Acting Comptroller General of the United States: 
U.S. Government Accountability Office: 
Washington, DC 20548: 

Dear Mr, Dodaro: 

Thank you for the opportunity to respond to your proposed report 
entitled Personnel Security Clearances: Progress Has Been Made to 
Improve Timeliness but Continued Oversight is Needed to Sustain 
Momentum (GAO-11-65). This report is a fair and thorough assessment of 
the Personnel Security Clearance reform effort's progress to date. I 
have enclosed my feedback on your report's observations and 
recommendations. The Office of the Director of National Intelligence 
received input on your report from the Department of Defense, the 
Office of Personnel Management, and the Intelligence Community round 
table participants. 

As GAO noted, significant overall progress has been made to improve 
the timeliness of personnel security clearance investigations and 
adjudications. The reform effort, led by the Performance 
Accountability Council, continues to implement reforms designed to 
provide consistent timeliness, improve quality and enable reciprocity 
to the fullest extent practical across Executive Branch agencies. We 
look forward to working with you in the future as we continue the 
reform process. 

Sincerely, 

Signed by: 

James R. Clapper: 

Attachment: 1. GAO Draft Report: 

cc: Ms. Brenda Farrell: 

[End of letter] 

Office of the Director of National Intelligence Response: 

GAO Draft Report: Personnel Security Clearances: Progress Has Been 
Made to Improve Timeliness but Continued Oversight is Needed to 
Sustain Momentum (GA0-11-65): 

GAO Observation: Significant progress has been made to improve the 
timeliness of investigation and adjudication of personnel security 
clearances, which was attributable to Department of Defense (DOD) 
whose clearances comprise about 90% of government-wide clearances. 
Although the majority of clearances are processed within the IRTPA 60-
day objective, individual agency timeliness varies and they continue 
to face a number of challenges for meeting timelines objectives, 
including personnel limitations, variances among agencies in adopting 
information technology caused by resources constraints, and additional 
agency-specific requirements that must be met before granting a 
security clearance. 

ODNI Response: I agree with GAO's observation that significant 
timeliness improvements have been made which are due in large part to 
implementation of reformed electronic, automated personnel security 
processes. It should be further noted that DOD, with the volume 
majority of clearances, achieved adjudicative timeliness well under 
the 20 day goal for the entire fiscal year which allowed for the 
combined Executive Branch investigation/adjudication timeliness to 
fall within the 60 days prescribed by IRTPA. 

GAO Recommendation 1: GAO recommends that the Performance 
Accountability Council collaborate with executive agencies that are 
not yet achieving the 60-day timeliness objective to take the 
following actions: 1) identify challenges to timeliness, 2) develop 
mitigation strategies to enable each agency to comply with IRTPA 
timeliness objectives, 3) set timelines for accomplishing the required 
actions, 4) monitor agency progress, and 5) report on these plans and 
progress in the annual report to Congress. 

ODNI Response: Concur. The Security Executive Agent, through Joint 
Reform Team (JRT) efforts, collaborates in a variety of ways with all 
executive agencies to assist them in improving timeliness, 
reciprocity, quality, and other strategic goals outlined in IRTPA. 
Agencies submitted timelines for reform in March 2009 via a JRT-
developed plan of actions and milestone (POA&M) template. The JRT 
monitors agency progress against their original plans, as well as 
challenges to implementation and mitigation strategies if the agency 
is behind schedule, through the agency-submitted quarterly updates and 
reports progress to the Performance Accountability Council. 

In addition, the JRT is conducting agency-focused site visits to 
assist agencies by addressing issues GAO identified for action. The 
JRT will use these meetings to help agencies further define the 
challenges to timeliness and reform implementation and to develop 
tailored mitigation plans to achieve reform goals. To provide Congress 
additional insight to these activities, the Security Executive Agent 
will address agency challenges and mitigation strategies in the 
February 2011 IRTPA Annual Report. 

GAO Recommendation 2: GAO recommends that the Performance 
Accountability Council develop comprehensive, standardized metrics to 
track reciprocity and report the findings from the expanded tracking 
to Congress. 

ODNI Response: The Security Executive Agent, in partnership with the 
Performance Accountability Council's Performance Management and 
Measures subcommittee, continues to develop additional performance 
measures for reciprocity, timeliness, and quality. The Security 
Executive Agent will include such measures in its annual report to 
Congress. 

[End of section] 

Appendix III: Comments from the Office of Personnel Management: 

United States Office Of Personnel Management: 
The Director: 
Washington, DC 20415: 

November 1, 2010: 

Ms. Brenda S. Farrell: 
Director, Defense Capabilities and Management: 
U.S. Government Accountability Office (GAO): 
Washington, DC 20548: 

Dear Ms. Farrell: 

Thank you for the opportunity to respond to the proposed report 
entitled Personnel Security Clearances: Progress has Been Made to 
Improve Timeliness but Continued Oversight is Needed
to Sustain Momentum (GAO-11-65). The U.S. Office of Personnel 
Management (OPM) is pleased to see that the report recognizes the 
progress that has been made in the security clearance process and 
agrees with the recommendations that GAO has made at the end of its 
report. Our comments to the proposed report are enclosed for your 
review and consideration. 

Please do not hesitate to contact Merton Miller, Deputy Associate 
Director for External Affairs of OPM's Federal Investigative Service 
at 202-606-1042 or Tania Shand, Director of OPM's Congressional and 
Legislative Affairs at 202-606-1300, if you have any further questions 
or wish to discuss our comments. 

Sincerely, 

Signed by: 

John Berry: 
Director: 	 

Enclosure: 

[End of letter] 

Recommended Adjustments to the Draft Statement of Fact, GAO's Review of
Personnel Security Clearance Reform (GAO-11-65): 

1. Page 20, Figure 2, revise to include percentage of OPM workload and 
correct data: DoD (92.5%)- Second Quarter - replace "45" with "42", 
DHS (3.5%), DOE (1.2%) - Second Quarter and Third Quarter - replace 
"45" and "44" with "42" and "42" respectively, DOI (0.8%)- Third 
Quarter - replace "63" with "65", Treasury (0.2%)- Second Quarter - 
replace "56" with "55", HHS (0.3%), VA (0.0%) - Second Quarter and 
Third Quarter-replace "78" and "70" with "81" and "63" respectively. 

Rationale: Accuracy. Adding workload percentage and correcting 
timeliness data will improve accuracy and clarity for the reader. This 
timeliness data provided by ODNI is not consistent with OPM's data. 
The inconsistency between OPM and ODNI's data is based upon the ODNI's 
inability to identify the fastest 90% "Initial" population. ODNI 
identifies the fastest 90% of the Top Secret population and then 
identifies the fastest 90% of the Secret/Confidential population and 
combines the two to determine the average timeliness of the 90% of 
that population. ODNI also combines data from the Intelligence 
Community that would not be included in OPM's data. Additionally, the 
timeliness data reflected in the chart is reflective of investigations 
with adjudication actions reported during those periods versus the 
investigation "closing" timeliness as reported by OPM and responsive 
to the Intelligence Reform and Terrorism Act of 2004. The data for the 
non-delegated agencies represented in this chart is accurately 
provided by OPM, and accepted by ODNI and approved by OMB on a 
quarterly basis. Given that GAO is not questioning the accuracy of the 
data provided by OPM, these adjustments to the GAO data are 
appropriate. 

2. Page 24, first paragraph, revise as follows: "Investigation 
services quality and cost." Officials representing agencies that use 
OPM as their investigative service provider cited challenges related 
to deficient investigative reports as a factor that slows agencies 
abilities to make adjudicative decisions-For example, some agencies 
noted that OPM investigative reports do not include complete copies of 
associated police reports and criminal record checks. We noted in our 
prior work that documentation was incomplete for most OPM-provided 
investigative reports based on independent review of about 3,500 
investigative reports. We also noted in our previous work that 
incomplete investigative documentation may lead to increases in the 
time it take to complete the clearance process and in the overall 
costs of the process. In response, OPM officials stated that ambiguous 
policies and customer misunderstanding of the investigative coverage 
limitations contribute significantly to perceptions of the sufficiency 
of OPM products. For instance, OPM officials state that OPM provides a 
summary synopsis of police and criminal record review findings, and 
asserts there is no policy requiring inclusion of copies of the 
original records while some adjudicative agency personnel disagree. On 
the other hand, some investigative coverage requirements are not 
satisfied due to coverage limitations as illustrated by the absence of 
subject interviews unobtainable because the subject is in a war zone, 
or the absence of employment verification when the employing entity 
does not permit release of the information. This confusion between 
requirements and exceptions and limitations on investigative 
collections may unnecessarily delay adjudications and lead agencies 
back to OPM for more information. Several agency officials state that 
in order to avoid further costs or delays that would result from 
working with OPM, they often choose to perform additional steps 
internally to obtain missing information, clarify or explain issues 
identified in investigative report, or gather evidence for issue 
resolution or mitigation. 

Rationale: Accuracy. Most of OPM customer agencies were not 
interviewed. Of those cited, GAO's quality example illustrates the 
clear disconnect between expectations and policy requirements. That 
disconnect has its roots in policy ambiguity, which is currently being 
addressed by reform efforts to revise investigative standards to 
clearly state requirements, to define collateral coverage standards 
when primary coverage is unobtainable, and to direct when waivers, 
deviations and exceptions are appropriate and acceptable. Having clear 
content standards will go a long way to assist the investigative 
service provider in fulfilling adjudicative expectations, and the 
adjudicator in concluding determinations without concern that they 
will be second guessed. Finally, the contrast between intelligence 
community circumstances (serving a single, small volume requirement) 
with OPM circumstances (serving over 90% of the federal government and 
200 plus agencies with multiple contracts) on the treatment of "costs" 
is not relevant. Intelligence community entities are all doing very in-
depth investigations to one standard to meet one agencies expectation, 
and they have the added ability to insert adjudicator prerogative into 
the final determination of sufficiency. OPM is governed by revolving 
fund (fee-for-service rules), and must work with contracts to cover a 
variety of investigative products, policies and customer expectations. 
This is another situation in which having clear standards will do more 
to eliminate the need for agencies to revisit investigative products 
with OPM, because they will permit OPM to satisfy the expectations the 
first time. 

3. Page 33, starts three lines from bottom - "Similarly, the other 
metrics proposed by the Performance Accountability Council...", delete 
the entire bulleted paragraph. 

Rationale: Accuracy. The metrics that are identified as "proposed" by 
the Joint Reform team were in fact developed by the Management and 
Metrics Subcommittee of the Performance Accountability Council some 
time ago and have all been regularly included in the quarterly reports 
that OPM prepares for OMB and Congress. In fact, the first proposed 
metric for "number of duplicate requests for investigation" is 
previously mentioned by GAO earlier on page 33 of the draft report 
where it states that "OPM created a metric in early 2009 to track
reciprocity..." This is the "duplication" measurement indicated as
"proposed" at the bottom of the page. The other metrics can be found 
in the quarterly report under the sections on e-QIP. 

4. Page 36, last sentence in first paragraph should be revised to 
clarify the reason OPM is unable to provide information from the 
investigation provided by another agency. 

"For example, OPM is not authorized to provide information it does not 
have to another agency. When investigations are conducted by agencies 
with delegated authority, the reports are indexed in OPM's SII/CVS but 
the actual reports are owned and maintained by the investigating 
agency. Requests for these investigative records must be referred to 
the owner." 

Rationale: Clarity. As written the sentence implied a "willingness" 
issue. The revised language makes the point by adding necessary 
details. 

[End of section] 

Appendix IV: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

Brenda S. Farrell, (202) 512-3604 or farrellb@gao.gov: 

Acknowledgments: 

In addition to the contact named above, Liz McNally (Assistant 
Director); David Moser (Assistant Director); James Ashley; Joseph M. 
Capuano; Sara Cradic; Cindy Gilbert; Linda Keefer; James Krustapentus; 
Greg Marchand; Richard Powelson; Jillena Roberts; and Amie Steele made 
key contributions to this report. 

[End of section] 

Related GAO Products: 

DOD Personnel Security Clearance Reform: Preliminary Observations on 
Timeliness and Quality. [hyperlink, 
http://www.gao.gov/products/GAO-11-185T]. Washington, D.C.: November 
16, 2010. 

Privacy: OPM Should Better Monitor Implementation of Privacy-Related 
Policies and Procedures for Background Investigations. [hyperlink, 
http://www.gao.gov/products/GAO-10-849]. Washington, D.C.: September 
7, 2010. 

Personnel Security Clearances: An Outcome-Focused Strategy and 
Comprehensive Reporting of Timeliness and Quality Would Provide 
Greater Visibility over the Clearance Process. [hyperlink, 
http://www.gao.gov/products/GAO-10-117T]. Washington, D.C.: October 1, 
2009. 

Personnel Security Clearances: Progress Has Been Made to Reduce Delays 
but Further Actions Are Needed to Enhance Quality and Sustain Reform 
Efforts. [hyperlink, http://www.gao.gov/products/GAO-09-684T]. 
Washington, D.C.: September 15, 2009. 

Personnel Security Clearances: An Outcome-Focused Strategy Is Needed 
to Guide Implementation of the Reformed Clearance Process. [hyperlink, 
http://www.gao.gov/products/GAO-09-488]. Washington, D.C.: May 19, 
2009. 

DOD Personnel Clearances: Comprehensive Timeliness Reporting, Complete 
Clearance Documentation, and Quality Measures Are Needed to Further 
Improve the Clearance Process. [hyperlink, 
http://www.gao.gov/products/GAO-09-400]. Washington, D.C.: May 19, 
2009. 

High-Risk Series: An Update. [hyperlink, 
http://www.gao.gov/products/GAO-09-271]. Washington, D.C.: January 22, 
2009. 

DOD Personnel Clearances: Preliminary Observations about Timeliness 
and Quality. [hyperlink, http://www.gao.gov/products/GAO-09-261R]. 
Washington, D.C.: December 19, 2008. 

Personnel Security Clearances: Preliminary Observations on Joint 
Reform Efforts to Improve the Governmentwide Clearance Eligibility 
Process. [hyperlink, http://www.gao.gov/products/GAO-08-1050T]. 
Washington, D.C.: July 30, 2008. 

Personnel Clearances: Questions for the Record Regarding Security 
Clearance Reform. [hyperlink, 
http://www.gao.gov/products/GAO-08-965R]. Washington, D.C.: July 14, 
2008. 

Personnel Clearances: Key Factors for Reforming the Security Clearance 
Process. [hyperlink, http://www.gao.gov/products/GAO-08-776T]. 
Washington, D.C.: May 22, 2008. 

Employee Security: Implementation of Identification Cards and DOD's 
Personnel Security Clearance Program Need Improvement. [hyperlink, 
http://www.gao.gov/products/GAO-08-551T]. Washington, D.C.: April 9, 
2008. 

DOD Personnel Clearances: Questions for the Record Related to the 
Quality and Timeliness of Clearances. [hyperlink, 
http://www.gao.gov/products/GAO-08-580R]. Washington D.C.: March 25, 
2008. 

DOD Personnel Clearances: DOD Faces Multiple Challenges in Its Efforts 
to Improve Clearance Processes for Industry Personnel. [hyperlink, 
http://www.gao.gov/products/GAO-08-470T]. Washington, D.C.: February 
12, 2008. 

Personnel Clearances: Key Factors to Consider in Efforts to Reform 
Security Clearance Processes. [hyperlink, 
http://www.gao.gov/products/GAO-08-352T]. Washington, D.C.: February 
27, 2008. 

DOD Personnel Clearances: Improved Annual Reporting Would Enable More 
Informed Congressional Oversight. [hyperlink, 
http://www.gao.gov/products/GAO-08-350]. Washington, D.C.: February 
13, 2008. 

DOD Personnel Clearances: Delays and Inadequate Documentation Found 
for Industry Personnel. [hyperlink, 
http://www.gao.gov/products/GAO-07-842T]. Washington, D.C.: May 17, 
2007. 

High Risk Series: An Update. [hyperlink, 
http://www.gao.gov/products/GAO-07-310]. Washington, D.C.: January 
2007. 

DOD Personnel Clearances: Additional OMB Actions Are Needed to Improve 
the Security Clearance Process. [hyperlink, 
http://www.gao.gov/products/GAO-06-1070]. Washington, D.C.: September 
28, 2006. 

DOD Personnel Clearances: Questions and Answers for the Record 
Following the Second in a Series of Hearings on Fixing the Security 
Clearance Process. [hyperlink, 
http://www.gao.gov/products/GAO-06-693R]. Washington, D.C.: June 14, 
2006. 

DOD Personnel Clearances: New Concerns Slow Processing of Clearances 
for Industry Personnel. [hyperlink, 
http://www.gao.gov/products/GAO-06-748T]. Washington, D.C.: May 17, 
2006. 

DOD Personnel Clearances: Funding Challenges and Other Impediments 
Slow Clearances for Industry Personnel. [hyperlink, 
http://www.gao.gov/products/GAO-06-747T]. Washington, D.C.: May 17, 
2006. 

Questions for the Record Related to DOD's Personnel Security Clearance 
Program and the Government Plan for Improving the Clearance Process. 
[hyperlink, http://www.gao.gov/products/GAO-06-323R]. Washington, 
D.C.: January 17, 2006. 

DOD Personnel Clearances: Government Plan Addresses Some Long-standing 
Problems with DOD's Program, But Concerns Remain. [hyperlink, 
http://www.gao.gov/products/GAO-06-233T]. Washington, D.C.: November 
9, 2005. 

DOD Personnel Clearances: Some Progress Has Been Made but Hurdles 
Remain to Overcome the Challenges That Led to GAO's High-Risk 
Designation. [hyperlink, http://www.gao.gov/products/GAO-05-842T]. 
Washington, D.C.: June 28, 2005. 

High-Risk Series: An Update. [hyperlink, 
http://www.gao.gov/products/GAO-05-207]. Washington, D.C.: January 
2005. 

[End of section] 

Footnotes: 

[1] GAO, High-Risk Series: An Update, [hyperlink, 
http://www.gao.gov/products/GAO-05-207] (Washington, D.C.: January 
2005). 

[2] GAO, High-Risk Series: An Update, [hyperlink, 
http://www.gao.gov/products/GAO-07-310] (Washington, D.C.: January 
2007); and High-Risk Series: An Update, [hyperlink, 
http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: January 
2009). 

[3] GAO, DOD Personnel Clearances: Comprehensive Timeliness Reporting, 
Complete Clearance Documentation and Quality Measures Are Needed to 
Further Improve the Clearance Process, [hyperlink, 
http://www.gao.gov/products/GAO-09-400] (Washington, D.C.: May 19, 
2009). 

[4] Pub. L. No. 108-458, §3001 (2004) (codified at 50 U.S.C. 435b). 
While IRTPA was a far-reaching act with many broad implications, our 
references to it throughout this report pertain solely to section 
3001, unless otherwise specified. 

[5] This team also now includes representatives of the Office of 
Management and Budget and Office of Personnel Management. 

[6] GAO, High-Risk Series: An Update, [hyperlink, 
http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: January 
2009). 

[7] H.R. Rep. No. 110-916 (2008). 

[8] In the last 3 years, GAO has also testified on security clearance 
reform before (1) the Subcommittee on Oversight of Government 
Management, the Federal Workforce, and the District of Columbia of the 
Senate Committee on Homeland Security and Governmental Affairs, (2) 
the Subcommittee on Government Management, Organization, and 
Procurement, House Committee on Oversight and Government Reform, and 
(3) the Subcommittee on Readiness, House Committee on Armed Services. 

[9] Pub. L. No. 111-259, § 367 (2010). 

[10] [hyperlink, http://www.gao.gov/products/GAO-09-400]; and 
Personnel Security Clearances: An Outcome-Focused Strategy Is Needed 
to Guide Implementation of the Reformed Clearance Process, [hyperlink, 
http://www.gao.gov/products/GAO-09-488] (Washington, D.C.: May 19, 
2009). 

[11] We met with officials from the Central Intelligence Agency, 
Defense Intelligence Agency, Federal Bureau of Investigation, National 
Geospatial-Intelligence Agency, National Reconnaissance Office, 
National Security Agency, and the Department of State. 

[12] We met with officials from the Departments of Energy, Health and 
Human Services, Homeland Security, Justice, the Treasury, and Veterans 
Affairs. 

[13] We selected agencies based on their ability to meet a combination 
of one or more of the following criteria: (1) utilizes Office of 
Personnel Management to conduct security clearance investigations, (2) 
conducts an average of 5,000 cases per year, (3) is an Intelligence 
Community agency, or (4) is a member of the Performance Accountability 
Council. Because this is a non-probability sample, our findings do not 
generalize to the agencies that we did not include in our review. 

[14] Department of Defense: Air Force, Army, Navy, Defense Industrial 
Security Clearance Office, Defense Intelligence Agency, Defense Office 
of Hearings and Appeals, Washington Headquarters Services, Joint 
Chiefs of Staff Central Adjudication Facilities, Business 
Transformation Agency, Defense Personnel Security Research Center, 
Office of the Under Secretary of Defense for Intelligence, and the 
National Security Agency; Intelligence Community: National Geospatial-
Intelligence Agency, National Reconnaissance Office, Central 
Intelligence Agency, Federal Bureau of Investigation, Department of 
State Bureau of Intelligence and Research, and Office of the Director 
of National Intelligence; and additional executive branch agencies: 
Health and Human Services, Department of Energy, Department of 
Homeland Security, Department of the Treasury, Department of Justice, 
Office of Personnel Management, and Department of Veterans Affairs. 

[15] Performance Accountability Council, Security and Suitability 
Process Reform Strategic Framework (Washington, D.C.: February 2010). 
This report was created under the Performance Accountability Council 
by the Joint Reform Team. 

[16] Performance Accountability Council, Security and Suitability 
Process Reform Strategic Framework (Washington, D.C.: February 2010). 

[17] Our analysis of timeliness data does not include the following 
elements of the agencies in our review: Department of Homeland 
Security: Homeland Security Headquarters, Immigration and Customs 
Enforcement, U.S. Secret Service, U.S. Customs and Border Protection, 
select positions in the U.S. Coast Guard; Department of Justice: 
Bureau of Alcohol, Tobacco, Firearms and Explosives; and Department of 
the Treasury: Bureau of the Public Debt, Bureau of Engraving and 
Printing. 

[18] These databases included DOD's Joint Personnel Adjudication 
System, OPM's Central Verification System, and the Intelligence 
Community's Scattered Castles. 

[19] Pub. L. No. 108-458, § 3001 (2004) (codified at 50 U.S.C. § 
435b). According to IRTPA, this period shall include a period of not 
longer than 40 days to complete the investigative phases of the 
clearance review and a period of not longer than 20 days to complete 
the adjudicative phase of the clearance review. These measures apply 
to initial personnel security clearances (i.e., cases in which 
individuals who enter positions in government or industry that require 
a clearance do not have a clearance or have not been granted 
reciprocity). 

[20] Performance Accountability Council, Security and Suitability 
Process Reform Strategic Framework (Washington, D.C.: February 2010). 

[21] IRTPA's new timeliness objectives became effective as of December 
17, 2009, midway through the first quarter of the fiscal year. This 
analysis is based on the methodology used by the Performance 
Accountability Council that counts the fastest end-to-end cases based 
only on completed cases adjudicated by the respective agencies in the 
specified quarter of the fiscal year. 

[22] The Intelligence Authorization Act for Fiscal Year 2010 extended 
this reporting requirement beyond 2011. Pub. L. No. 111-259, § 367 
(2010). 

[23] Pub. L. No. 108-458, § 3001(d) (2004) (codified at 50 U.S.C. 
435b(d)). 

[24] ODNI, Intelligence Community Policy Guidance 704.4, Reciprocity 
of Personnel Security Clearance and Access Determinations (Oct. 2, 
2008). 

[25] Office of Management and Budget, Memorandum for Deputies of 
Executive Departments and Agencies: Reciprocal Recognition of Existing 
Personnel Security Clearance (Dec. 12, 2005). 

[26] GAO, Personnel Clearances: Key Factors to Consider in Efforts to 
Reform Security Clearance Processes, [hyperlink, 
http://www.gao.gov/products/GAO-08-352T] (Washington, D.C.: Feb. 27, 
2008). 

[27] Pub. L. No. 108-458, §3001(e) (2004) (codified at 50 U.S.C. § 
435b(e)). 

[28] Performance Accountability Council, Suitability and Security 
Process Reform: Strategic Framework (Washington, D.C., February 2010). 

[29] Sensitive Compartmented Information is classified intelligence 
information concerning or derived from intelligence sources, methods, 
or analytical processes that is required to be protected within formal 
access control systems established and overseen by the Director of 
National Intelligence. A Special Access Program is a program 
established for a specific class of classified information that 
imposes safeguarding and access requirements that exceed those 
normally required for information at the same classification level. 

[30] According to the Performance Accountability Council's Strategic 
Framework, the federal government conducts almost 900,000 national 
security investigations a year. 

[31] If a clearance holder has a long-term need to access classified 
information, the clearance must be renewed: top secret, 5 years; 
secret, 10 years; and confidential, 15 years. 

[32] Determinations of suitability for government employment in 
positions in the competitive service and for career appointment in the 
Senior Executive Service include consideration of aspects of an 
individual's character or conduct that may have an impact on the 
integrity or efficiency of their service. Exec. Order No. 13467, 
Reforming Processes Related to Suitability for Government Employment, 
Fitness for Contractor Employees, and Eligibility for Access to 
Classified National Security Information, at 1.2(I) (June 30, 2008) 
(citing 5 C.F.R. Part 731). 

[33] [hyperlink, http://www.gao.gov/products/GAO-05-207]; [hyperlink, 
http://www.gao.gov/products/GAO-07-310]; and [hyperlink, 
http://www.gao.gov/products/GAO-09-271]. 

[34] Exec. Order No. 13381, Strengthening Processes Relating to 
Determining Eligibility for Access to Classified National Security 
Information (June 27, 2005). This order was revoked by Exec. Order No. 
13467, Reforming Processes Related to Suitability for Government 
Employment, Fitness for Contractor Employees, and Eligibility for 
Access to Classified National Security Information (June 30, 2008). 

[35] Exec. Order No. 13467, Reforming Processes Related to Suitability 
for Government Employment, Fitness for Contractor Employees, and 
Eligibility for Access to Classified National Security Information 
(June 30, 2008). 

[36] Pub. L. No. 108-458, §3001 (2004). IRTPA timeliness objectives 
apply only to initial personnel security clearances. Initial 
clearances involves cases in which individuals who enter positions in 
government or industry that require a clearance do not have a 
clearance or have not been granted reciprocity to honor a previously 
granted clearance. 

[37] Effective December 17, 2009, this IRTPA objective replaced the 
IRTPA requirement that determinations on 80 percent of initial 
clearances be made within an average of 120 days or less (90 days for 
investigations and 30 days for adjudications). 

[38] Performance Accountability Council, Security and Suitability 
Process Reform Strategic Framework (Washington, D.C.: February 2010). 

[39] This analysis is based on the methodology used by the Performance 
Accountability Council that counts the fastest end-to-end cases based 
only on completed cases adjudicated by the respective agencies in the 
specified quarter of the fiscal year. 

[40] According to DOD officials, DOD's system for tracking and 
reporting security clearance case information does not differentiate 
between initial secret/confidential clearances and renewal secret/ 
confidential clearances. Therefore, the Performance Accountability 
Council timeliness reports on initial clearances include DOD secret/ 
confidential renewal cases. 

[41] Under Exec. Order No. 13467, Reforming Processes Related to 
Suitability for Government Employment, Fitness for Contractor 
Employees, and Eligibility for Access to Classified National Security 
Information, sec. 2.3(c)(iv)) (June 30, 2008), the Director of 
National Intelligence, as the Security Executive Agent, has the 
authority to designate agencies to conduct investigations. Agencies 
are required to use OPM as the investigative service provider for 
initial clearances unless the Director of National Intelligence has 
provided them with delegated authority to conduct their own 
investigations. 

[42] Homeland Security Presidential Directive-12 (HSPD-12), Policies 
for a Common Identification Standard for Federal Employees and 
Contractors (August. 27, 2004). 

[43] Electronic delivery systems enable investigative service 
providers to electronically transmit completed investigative files to 
adjudicative agencies. Electronic adjudication capabilities determine 
if the subject meets the adjudicative guidelines based on 
investigative reports. These capabilities enable adjudicative 
determinations for cases that do not contain issues that may affect an 
individual's eligibility to access classified information or systems 
to be made. Currently, electronic adjudication systems are only 
approved to adjudicate secret or confidential clearance cases. 

[44] Case management workflow tools, such as DOD's Case Adjudication 
Tracking System, are used by adjudicators to document the completeness 
of investigative files, manage the adjudication process, and document 
decisions made and actions taken regarding a case. The Clearance 
Adjudication Tracking System provides both electronic delivery and 
electronic adjudication capabilities. 

[45] These DOD component agencies include the Joint Chiefs of Staff, 
Army, Navy, and the Defense Office of Hearings and Appeals. The 
Defense Intelligence Agency, who adjudicates certain cases for the 
Joint Chiefs of Staff and Washington Headquarters Services, provided 
similar comments. 

[46] [hyperlink, http://www.gao.gov/products/GAO-09-400]. 

[47] [hyperlink, http://www.gao.gov/products/GAO-09-400]. 

[48] GAO, DOD Personnel Clearances: Government Plan Addresses Some 
Longstanding Problems with DOD's Program, But Concerns Remain, 
[hyperlink, http://www.gao.gov/products/GAO-06-233T] (Washington, 
D.C.: Nov. 9, 2005). 

[49] H.R. Rep. No. 110-916 (2008). 

[50] ODNI, Intelligence Community Policy Guidance 704.4, Reciprocity 
of Personnel Security Clearance and Access Determinations (Oct. 2, 
2008). 

[51] Office of Management and Budget, Memorandum for Deputies of 
Executive Departments and Agencies: Reciprocal Recognition of Existing 
Personnel Security Clearances (Dec. 12, 2005); Office of Management 
and Budget, Memorandum for Deputies of Executive Departments and 
Agencies: Reciprocal Recognition of Existing Personnel Security 
Clearances (July 17, 2006). 

[52] Intelligence Community Standard 2008-700-1 defines scope as the 
time period to be covered and the sources of information to be 
contacted during the prescribed course of a personnel security 
investigation. OMB considers significant scope deficiencies to be 
deviations. Therefore, agencies are not required to honor a previous 
clearance that is not "in-scope". Furthermore, challenges identified 
in this section of the report may not apply to "out-of-scope" 
clearances. 

[53] According to Intelligence Community Policy Guidance Number 704.4, 
conditions, deviations, and waivers are defined as: (1) condition: 
access eligibility granted or continued with the provision that 
additional security measures shall be required; (2) deviation: access 
eligibility granted or continued despite either a significant gap in 
coverage or scope in the investigation or an out-of-date 
investigation; (3) waiver: access eligibility granted or continued 
despite the presence of substantial issue information that would 
normally preclude access. 

[54] Joint Security and Suitability Reform Team, Security and 
Suitability Process Reform (December 2008). 

[55] Exec. Order No. 13488, Granting Reciprocity on Excepted Service 
and Federal Contractor Employee Fitness and Reinvestigating 
Individuals in Positions of Public Trust (Jan. 16, 2009). 

[56] Memorandum from John Berry, Director, Office of Personnel 
Management, to Heads of Executive Departments and Agencies, Guidance 
on Implementing Executive Order 13488: Granting Reciprocity on 
Excepted Service and Federal Contractor Employee Fitness and 
Reinvestigating Individuals in Positions of Public Trust (Sept. 24, 
2009). 

[57] [hyperlink, http://www.gao.gov/products/GAO-08-352T].  

[58] [hyperlink, http://www.gao.gov/products/GAO-09-488]. 

[59] Executive Order 13467 established the Director of the National 
Intelligence as the Security Executive Agent and requires the ODNI to 
ensure reciprocal recognition of eligibility for access to classified 
information among the agencies. 

[60] [hyperlink, http://www.gao.gov/products/GAO-08-352T].  

[61] Pub. L. No. 108-458, § 3001(e) (2004). 

[62] Joint Security and Suitability Reform Team, Security and 
Suitability Process Reform (Washington, D.C.: April 2008 and updated 
December 2008); Joint Security and Suitability Reform Team, Enterprise 
Information Technology Strategy (Washington, D.C.: Mar. 17, 2009); and 
Performance Accountability Council, Security and Suitability Process 
Reform: Strategic Framework (Washington, D.C., February 2010). 

[63] Joint Security and Suitability Reform Team, Enterprise 
Information Technology Strategy (Washington, D.C., Mar. 17, 2009). 

[64] Performance Accountability Council, Security and Suitability 
Process Reform: Strategic Framework (Washington, D.C., February 2010). 

[65] [5] According to OMB Memorandum M-07-16, dated May 22, 2007, 
"Personally Identifiable Information" refers to information which can 
be used to distinguish or trace an individual's identity (e.g., name, 
social security number, biometric records), alone or when combined 
with other personal or identifying information that is linked or 
linkable to a specific individual (e.g., date and place of birth, 
mother's maiden name). 

[66] DOD data available through this single entry point includes name, 
Social Security number, date and type of investigation, and clearance 
eligibility. 

[67] According to Intelligence Community Policy Guidance Number 704.4, 
conditions, deviations, and waivers are defined as (1) condition: 
access eligibility granted or continued with the provision that 
additional security measures shall be required; (2) deviation: access 
eligibility granted or continued despite either a significant gap in 
coverage or scope in the investigation or an out-of-date 
investigation; (3) waiver: access eligibility granted or continued 
despite the presence of substantial issue information that would 
normally preclude access. 

[68] OPM guidance for implementing Executive Order 13488 defines 
Excepted Service positions as those positions: (1) not in the 
competitive service; (2) not in the career senior executive service; 
(3) and not in the Intelligence Community unless covered by OPM 
appointing authorities. 

[69] The Homeland Security Presidential Directive-12, issued on August 
27, 2004, requires that United States government agencies collaborate 
to develop a federal standard for secure and reliable forms of 
identification for all U.S. government employees and contractors 
needing regular physical access to federal facilities. 

[70] According to ODNI and DOD officials, Counter-Intelligence 
polygraphs address issues such as foreign contacts and media 
disclosure. Expanded Scope polygraphs address questions not reported 
on the application forms about criminal activity, computer misuse, and 
falsification of applications. 

[71] The non-intelligence, non-DOD agencies include the Department of 
Energy, Department of Justice, Department of the Treasury, Department 
of Homeland Security, Department of Health and Human Services, and 
Department of Veterans Affairs. 

[72] Army Central Adjudication Facility officials said that their 
access was based on a case by case basis. 

[73] [hyperlink, http://www.gao.gov/products/GAO-09-400]. 

[74] Performance Accountability Council, Security and Suitability 
Process Reform Strategic Framework (Washington, D.C.: February 2010). 

[75] We met with officials from the Departments of Energy, Health and 
Human Services, Homeland Security, Justice, the Treasury, and Veterans 
Affairs. We selected agencies based on their ability to meet a 
combination of one or more of the following criteria: (1) utilizes OPM 
to conduct security clearance investigations, (2) conducts an average 
of 5,000 cases per year, (3) is an Intelligence Community agency, or 
(4) is a member of the Performance Accountability Council. Because 
this is a non-probability sample, our findings do not generalize to 
the agencies that we did not include in our review. 

[76] Joint Security and Suitability Reform Team, Security and 
Suitability Process Reform (Washington, D.C.: April 2008 and updated 
December 2008); Joint Security and Suitability Reform Team, Enterprise 
Information Technology Strategy (Washington, D.C.: Mar. 17, 2009); and 
Performance Accountability Council, Security and Suitability Process 
Reform: Strategic Framework (Washington, D.C., February 2010). 

[End of section] 

GAO's Mission: 

The Government Accountability Office, the audit, evaluation and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the performance 
and accountability of the federal government for the American people. 
GAO examines the use of public funds; evaluates federal programs and 
policies; and provides analyses, recommendations, and other assistance 
to help Congress make informed oversight, policy, and funding 
decisions. GAO's commitment to good government is reflected in its core 
values of accountability, integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each 
weekday, GAO posts newly released reports, testimony, and 
correspondence on its Web site. To have GAO e-mail you a list of newly 
posted products every afternoon, go to [hyperlink, http://www.gao.gov] 
and select "E-mail Updates." 

Order by Phone: 

The price of each GAO publication reflects GAO’s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO’s Web site, 
[hyperlink, http://www.gao.gov/ordering.htm]. 

Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537. 

Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional 
information. 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: 
E-mail: fraudnet@gao.gov: 
Automated answering system: (800) 424-5454 or (202) 512-7470: 

Congressional Relations: 

Ralph Dawn, Managing Director, dawnr@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, D.C. 20548: 

Public Affairs: 

Chuck Young, Managing Director, youngc1@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, D.C. 20548: