This is the accessible text file for GAO report number GAO-11-65 entitled 'Personnel Security Clearances: Progress Has Been Made to Improve Timeliness but Continued Oversight Is Needed to Sustain Momentum' which was released on December 1, 2010. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office: GAO: Report to Congressional Requesters: November 2010: Personnel Security Clearances: Progress Has Been Made to Improve Timeliness but Continued Oversight Is Needed to Sustain Momentum: GAO-11-65: GAO Highlights: Highlights of GAO-11-65, a report to congressional requesters. Why GAO Did This Study: In light of long-standing problems with delays and backlogs, Congress mandated personnel security clearance reforms through the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). These included requirements related to timeliness, reciprocity, and the creation of a single database to house personnel security clearance information. In 2008, Executive Order 13467 established the Performance Accountability Council. GAO was asked to review the extent to which executive branch agencies (1) investigate and adjudicate personnel security clearance applications in a timely manner, (2) honor previously granted security clearances, and (3) share personnel security clearance information in a single, integrated database. GAO reviewed and analyzed Performance Accountability Council timeliness data for fiscal year 2009 and the first three quarters of fiscal year 2010. GAO also examined key clearance reform documents and conducted interviews with executive branch agencies, including members of the Intelligence Community, to discuss the three stated objectives. What GAO Found: Significant overall progress has been made to improve the investigation and adjudication of personnel security clearance applications in a timely manner. This is largely attributable to the Department of Defense (DOD), whose clearances comprise a vast majority of governmentwide initial clearances. IRTPA establishes an objective for all agencies to make a determination on at least 90 percent of all applications for a personnel security clearance within an average of 60 days. The majority of clearances are processed in line with the IRTPA 60-day objective. Certain agencies, however, continue to face challenges for meeting timeliness objectives. Out of the 14 agencies included in GAO’s review, DOD, the Department of Energy, and the National Geospatial-Intelligence Agency met the IRTPA 60-day timeliness objective in the first three quarters of fiscal year 2010. Timeliness among the other executive branch agencies ranged from 62 to 154 days. IRTPA and the recent Intelligence Authorization Act for Fiscal Year 2010 also require annual reporting on the progress made towards meeting objectives, including a discussion of impediments related to timeliness and quality. While the Performance Accountability Council has taken steps to assist in implementation of reform efforts, it has not reported on the impediments to meeting timeliness objectives for specific agencies not yet achieving this goal. Executive branch agency officials stated that they often honor previously granted personnel security clearances (i.e., grant reciprocity), but the true extent of reciprocity is unknown because governmentwide metrics do not exist. IRTPA generally requires that all personnel security clearance investigations and determinations be accepted by all agencies, with limited exceptions when necessary for national security purposes. Agency officials stated that they grant reciprocity, but some noted that they have taken steps to obtain additional information before granting reciprocity. For example, officials stated that they may request copies of background investigation reports before they will honor a security clearance because information available in databases contain limited, summary level detail. Agency officials also reported that steps must be taken to conduct suitability determinations to ensure an applicant’s character is appropriate for the position. The extent to which reciprocity is occurring is unknown because no metrics exist to consistently and comprehensively track reciprocity. Although there are no plans to develop a single, integrated database, steps have been taken to upgrade existing systems and increase information sharing. The Performance Accountability Council has opted to leverage existing systems in lieu of the single, integrated database required by IRTPA. Officials assert that a single database is not a viable option due to concerns related to privacy, security, and data ownership. Therefore, a single search capability of existing databases is being used to address the IRTPA requirement. For example, information from two primary databases can now be accessed from a single entry point, allowing executive branch agencies to share clearance information with one another. The Intelligence Community agencies share information through a separate database. What GAO Recommends: GAO recommends that the Performance Accountability Council collaborate with executive agencies to develop a plan to improve timeliness for those agencies not yet achieving the 60-day timeliness objective and metrics to track reciprocity. In commenting on this draft, the Performance Accountability Council concurred with all recommendations. View [hyperlink, http://www.gao.gov/products/GAO-11-65] or key components. For more information, contact Brenda S. Farrell at (202) 512-3604 or farrellb@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Significant Overall Progress Has Been Made to Improve Timeliness, but Some Executive Agencies Continue to Face Challenges in Meeting Timeliness Objectives: Executive Agencies Often Grant Reciprocity, Although Challenges Exist to Measuring and Tracking Reciprocity: Although There Are No Plans to Develop a Single, Integrated Database, Steps Have Been Taken to Upgrade Existing Systems and Increase Information Sharing: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Scope and Methodology: Appendix II: Comments from the Office of the Director of National Intelligence: Appendix III: Comments from the Office of Personnel Management: Appendix IV: GAO Contact and Staff Acknowledgments: Related GAO Products: Figures: Figure 1: Key Events Related to the Security Clearance Reform Effort: Figure 2: Timeliness for the First Three Quarters of Fiscal Year 2010: Average of the Fastest 90 Percent of Initial Clearance Cases for Select Executive Branch Agencies: Abbreviations: DOD: Department of Defense: e-QIP: electronic Questionnaires for Investigations Processing: GAO: Government Accountability Office: IRTPA: Intelligence Reform and Terrorism Prevention Act of 2004: ODNI: Office of the Director of National Intelligence: OMB: Office of Management and Budget: OPM: Office of Personnel Management: [End of section] United States Government Accountability Office: Washington, DC 20548: November 19, 2010: The Honorable Anna G. Eshoo: Chairwoman: Subcommittee on Intelligence Community Management: Permanent Select Committee on Intelligence: House of Representatives: The Honorable Rush D. Holt: House of Representatives: Personnel security clearances allow government and industry personnel to gain access to classified information that, through unauthorized disclosure, can in some cases cause exceptionally grave damage to U.S. national security. The July 2010 and subsequent October 2010 reported unauthorized leak, of almost 500,000 classified documents posted to the Internet, related to the ongoing wars in Afghanistan and Iraq highlights the inherent risks involved when granting an individual a security clearance. Following the terrorist attacks on September 11, 2001, the nation's defense and intelligence needs grew, prompting increased demand for personnel with security clearances. Accompanying this increase in demand for clearances have been problems of delays and backlogs in the personnel security clearance process. In 2005, GAO first designated the Department of Defense's (DOD) personnel security clearance program a high-risk area because of these delays and backlogs.[Footnote 1] We continued that designation in our 2007 and 2009 updates to our high-risk list because delays continued and we found problems with the quality of investigation and adjudication documentation.[Footnote 2] For example, in our previous work, we noted that the average time to complete the fastest 90 percent of initial clearances for military and DOD civilians was 124 days.[Footnote 3] We have initiated additional work to assess DOD's personnel security clearance program and plan to issue our next high-risk report in January 2011. In light of long-standing concerns regarding delays in processing clearances and other issues, Congress set objectives and established requirements for improving the clearance process in section 3001 of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). [Footnote 4] IRTPA established objectives for timeliness, requirements for reciprocity (i.e., an agency's acceptance of a background investigation or clearance determination completed by any authorized investigative or adjudicative agency), and an integrated, secure database to house clearance information. In 2007, DOD and the Office of the Director of National Intelligence (ODNI) formed the Joint Security Clearance Process Reform Team, known as the Joint Reform Team, to improve the security clearance process governmentwide. [Footnote 5] In the following year, Executive Order 13467 was issued, establishing a Suitability and Security Clearance Performance Accountability Council (Performance Accountability Council) that is responsible for driving the implementation of reform and accountable to the President for achieving the reform effort's goals. We have previously noted that top leadership must be committed to organizational transformation.[Footnote 6] To this end, committed executive leadership has worked to reform the personnel security clearance process by improving timeliness and developing quality measures. However, four years after IRTPA was enacted, the House Permanent Select Committee on Intelligence, Subcommittee on Intelligence Community Management, concluded that the federal government's progress with respect to IRTPA requirements for reciprocity and a single integrated database had fallen short of the goals established in IRTPA.[Footnote 7] Congressional oversight through hearings held by the Subcommittee on Intelligence Community Management in February, July, and September 2008, and October 2009, has helped focus attention on the need for security clearance reform.[Footnote 8] In addition, the Intelligence Authorization Act for Fiscal Year 2010 requires reports by the President on the security clearance process, including information on timeliness and quality.[Footnote 9] In this context and building on our body of work examining personnel security clearance issues, you asked us to examine the ongoing reform effort with an emphasis on whether the current reform efforts were expediting the processing of clearances and enhancing reciprocity.[Footnote 10] Specifically, this report provides information on the extent to which select executive branch agencies (1) investigate and adjudicate initial personnel security clearance applications for civilians, military, and industry personnel in a timely manner; (2) honor previously granted personnel security clearances and the challenges, if any, that exist related to reciprocity; and (3) share personnel clearance information in a single, integrated database. In conducting this review, we focused our scope on DOD, seven agencies within the Intelligence Community,[Footnote 11] and a non-probability sample of six additional executive branch agencies [Footnote 12] that use the Office of Personnel Management (OPM) to conduct background investigations.[Footnote 13] The total sample of executive branch agencies represents 25 different DOD and non-DOD organizations. [Footnote 14] According to data contained in the Performance Accountability Council's 2010 report to Congress on clearances granted in calendar year 2009, the 14 agencies we selected in our timeliness review account for approximately 98 percent of initial clearance cases governmentwide annually.[Footnote 15] To assess the extent to which executive branch agencies investigate and adjudicate initial personnel security clearance applications for civilians, military, and industry personnel in a timely manner we conducted interviews with relevant officials to discuss aspects of timeliness, including variations in agency timeliness, progress made, and challenges faced. We analyzed the timeliness objectives specified in IRTPA and the timeliness data contained in the Performance Accountability Council's 2010 report to Congress on clearances granted in calendar year 2009.[Footnote 16] We obtained and reviewed quarterly data on executive branch agencies, including Intelligence Community agencies, provided by the Performance Accountability Council Subcommittee on Performance Management and Measures, which covered the first through third quarters of fiscal year 2010.[Footnote 17] These data were current as of August 2010. We also obtained and reviewed quarterly data for the executive branch agencies provided by OPM for the same time periods. The Performance Accountability Council reported agency timeliness data using two distinct methodologies. First, they calculated IRTPA timeliness by analyzing investigation and adjudication data separately, calculating the average timeliness of the fastest 90 percent of investigations and adjudications based on the fiscal quarter that the phase was reported as complete, and combining the timeliness data for the averages of investigations with the averages for adjudications by agency. The second methodology used by the Performance Accountability Council addressed only cases that were completed in the specific period. Under this methodology, the Performance Accountability Council calculated the "end-to-end" timeliness, which they defined as the time for an individual case to go through the initiation, investigation, and adjudication phases of the process. GAO utilized this second methodology to review and analyze the agency timeliness data that is contained in this report. The Performance Accountability Council excludes certain cases that could impact overall timeliness from its analysis. For example, IRTPA establishes a timeliness objective for the fastest 90 percent of cases, which allows agencies to exclude the slowest 10 percent of cases from the reported averages. We interviewed knowledgeable officials about the accuracy and completeness of the data to determine the reliability of the data. We determined that these data were sufficiently reliable for our purposes. To assess the extent to which executive branch agencies honor previously granted security clearances and the challenges, if any, that exist related to reciprocity, we reviewed the requirements specified in IRTPA and analyzed Executive Orders, Office of Management and Budget (OMB) memorandums, ODNI documents, and agency guidance related to reciprocity. We also analyzed existing and planned metrics developed by the Performance Accountability Council to track the extent to which reciprocity is honored. We met with security officials and adjudicators from DOD, the Intelligence Community, and a non- probability sample of executive branch agencies. We supplemented our analyses with information obtained from a roundtable discussion that we conducted with representatives of Intelligence Community agencies to examine the challenges these agencies face related to information sharing and granting reciprocity. For the purposes of our report, we define reciprocity as an agency's acceptance of a background investigation or clearance determination completed by another authorized investigative or adjudicative agency. We excluded from the scope of our work issues related to access to facilities, detailed employees, or access to classified information. To determine the extent to which select executive branch agencies share personnel clearance information in a single, integrated database, we conducted interviews with officials from OPM, DOD, and Intelligence Community agencies and reviewed OPM database enhancement plans that described recent developments in information sharing. We selected OPM, DOD, and agencies within the Intelligence Community because they own the three main security clearance databases that are used in the security clearance process.[Footnote 18] To determine the challenges associated with sharing clearance information in a single, integrated database, we reviewed the Joint Reform Team's Enterprise Information Technology Strategy and interviewed agency security managers and adjudicators who use the existing security clearance database systems. We conducted this performance audit from October 2009 through November 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our objectives. More detailed information on our scope and methodology is provided in appendix I. Results in Brief: Significant overall progress has been made to improve the investigation and adjudication of personnel security clearance applications in a timely manner. This is largely attributable to DOD, whose clearances comprise a vast majority of governmentwide initial clearances. IRTPA established an objective for each authorized adjudicative agency to "make a determination on at least 90 percent of all applications for a personnel security clearance within an average of 60 days from the date of receipt of the completed application by an authorized investigative agency" by December 17, 2009.[Footnote 19] Although the majority of clearances are processed in line with the IRTPA 60-day objective, agencies continue to face challenges for meeting timeliness objectives. According to the Performance Accountability Council's February 2010 annual report to Congress, five of the 14 agencies we included in our review met the IRTPA 60-day objective in the first quarter of fiscal year 2010.[Footnote 20] We found that four agencies met the objective in the second quarter and seven agencies met the objective in the third quarter.[Footnote 21] The Department of Defense, the Department of Energy, and the National Geospatial-Intelligence Agency met the IRTPA 60-day timeliness objective in all three quarters. We found a number of challenges to agencies meeting IRTPA timeliness objectives, including personnel limitations, variances among the agencies in adopting information technology caused by resource constraints, and additional agency- specific requirements that must be met before granting a security clearance. Agency officials with whom we spoke explained that there is a variance in agencies' adoption of the Electronic Questionnaires for Investigations Processing (e-QIP). According to these officials, e-QIP has sped up investigation timeliness for agencies that have adopted this technology because it provides OPM with more complete and better quality data earlier in the process. Agency officials also discussed the delays in adjudicative timeliness due to the need to follow up on investigations performed by OPM. Finally, timeliness for the Intelligence Community is affected by unique issues related to conditions of employment that require polygraphs or psychological evaluations that extend beyond the standard background investigation. IRTPA also requires the executive branch to submit an annual report, through 2011, to the appropriate congressional committees on the progress made toward meeting its requirements, including timeliness data and a discussion of any impediments to the smooth and timely functioning of its requirements.[Footnote 22] While the Performance Accountability Council, responsible for driving implementation of the reform effort and ensuring accountability, has taken steps to assist in implementation of reform efforts, it has not reported on the impediments to meeting timeliness objectives or plans to address impediments. As a result, decision makers may not have a complete picture of the progress made or the impediments to meeting timeliness objectives. We recommend that the Deputy Director of Management, OMB, in the capacity as Chair of the Performance Accountability Council, direct the Performance Accountability Council to collaborate with the agencies that are not meeting timeliness objectives to take the following actions: (1) identify challenges to timeliness, (2) develop mitigation strategies to enable each agency to comply with the IRTPA timeliness objectives, (3) set timelines for accomplishing the required actions, (4) monitor agency progress, and (5) report on these plans and progress in the annual reports to Congress. Agency officials stated that they routinely take steps to honor previously granted security clearances; however, there are no governmentwide metrics to comprehensively track when and why reciprocity is granted or denied. IRTPA generally requires that all security clearance investigations and determinations be accepted by all agencies, with limited exceptions when necessary for national security purposes.[Footnote 23] Further, ODNI guidance signed out in October 2008 amplifies this reciprocity requirement, stating that, except in limited circumstance, all Intelligence Community elements should "accept all in-scope security clearance or access determinations."[Footnote 24] Similarly, OMB issued guidance requiring agencies to reciprocally accept clearances when the prior clearance is current and there is no new derogatory information, among other things.[Footnote 25] However, agency officials stated that in some cases, they find it necessary to take additional steps to address limitations with available information before granting a reciprocal clearance. For example, because no single, integrated database exists and information currently being shared between agencies may be insufficient, agencies request additional information, such as copies of the original background investigation. Similarly, because of the different types of background investigations required by individual agencies, agencies may perform additional investigative work or request a new background investigation. In addition, agency officials identified broader challenges to granting reciprocity, such as the need to conduct suitability determinations or determine whether a prior clearance investigation and adjudication meets standards. All federal agencies are required to conduct basic suitability determinations to ensure that the applicant's character or conduct is appropriate for the position in question. However, some agencies have specific requirements to determine suitability before reciprocating a security clearance, according to agency officials with whom we spoke. While the Performance Accountability Council has identified reciprocity as a governmentwide strategic goal, we found that there is no clear evidence to show the extent to which reciprocity is granted because agencies lack comprehensive, standardized metrics to track reciprocity. We previously reported that developing metrics for assessing and regularly monitoring all aspects of the clearance process could add value in current and future reform efforts as well as supply better information for greater congressional oversight. [Footnote 26] However, we found that agencies do not consistently document the additional steps they have taken prior to granting a reciprocal clearance. For example, the Navy keeps electronic documentation, the Department of Energy and the Department of the Treasury keep paper documentation, and the Army and the Air Force do not maintain any documentation on the additional steps taken to accept a previously granted security clearance. Consequently, there is no consistent tracking of the amount of staff time spent on the additional actions that are taken to honor a previously granted security clearance. In addition, we found agencies do not consistently and comprehensively track the extent to which reciprocity is granted. While OPM has a metric to track reciprocity, this metric captures limited information, such as numbers of requested and rejected investigations, but not the number of cases in which a previously granted security clearance was or was not honored. Similarly, the metrics proposed by the Performance Accountability Council do not track the extent to which reciprocity is or is not ultimately honored. Without comprehensive, standardized metrics to track reciprocity, and documentation of the process, decision makers lack a complete picture of the extent to which reciprocity is granted and the challenges to honoring security clearances. We recommend that the Deputy Director of Management, OMB, in the capacity as Chair of the Performance Accountability Council, develop comprehensive metrics to track reciprocity and report the findings from the expanded tracking to Congress. Although IRTPA required the establishment of a single, integrated database, executive branch agencies have opted to focus on leveraging existing systems rather than establish a new database. IRTPA required that, not later than 12 months after the date of enactment of the act, the Director of the Office of Personnel Management and the Director of the Office of Management and Budget establish and commence operating and maintaining a single, integrated database of personnel security clearance information.[Footnote 27] Based on our analyses of a series of recent reports that the Joint Reform Team, under the Performance Accountability Council, issued between 2008 and 2010, and interviews conducted with OPM and ODNI officials, we found that there are no plans to create a new single, integrated database. OPM, DOD, and ODNI officials with whom we spoke explained that establishing a single, integrated database is not a viable option due to concerns related to privacy, security, and data ownership. Therefore, the Performance Accountability Council is focusing on using a single search capability of existing databases as the means by which they intend to address the IRTPA requirement. Although there are no plans to create a new governmentwide database, we found that non-intelligence agencies in our review are sharing information about personnel who hold or are seeking security clearances through two main databases that can be accessed through a single entry point. These two primary databases are used by non-intelligence agencies to store investigative and adjudicative information and according to the Performance Accountability Council, they account for decisions on about 90 percent of all security clearance holders in the federal government.[Footnote 28] Data is stored in either OPM's Central Verification System or DOD's Joint Personnel Adjudication System. Data from the two databases can be searched from a single entry point in the Central Verification System. In contrast, the Intelligence Community agencies share information with one another through a separate classified database known as Scattered Castles. According to Performance Accountability Council officials, the Performance Accountability Council is participating in an effort to explore ways to enhance information sharing between the Intelligence Community agencies and the non- Intelligence Community agencies. For example, a working group has been established to study alternatives to support a single-access point from which non-intelligence agencies can obtain clearance information and plans to complete its review in December 2010. In oral and written comments on a draft of this report, the OMB, ODNI, and OPM concurred with all of our recommendations. In particular, ODNI noted that it was already taking steps through the Performance Accountability Council to implement each recommendation. OMB, ODNI, DOD, and OPM also provided technical comments, which we incorporated into this report, as appropriate. Background: Personnel security clearances are required for access to certain national security information, which may be classified at one of three levels: confidential, secret, or top secret. A top secret clearance is generally also required for access to Sensitive Compartmented Information or Special Access Programs[Footnote 29]. The level of classification denotes the degree of protection required for information and the amount of damage that unauthorized disclosure could reasonably be expected to cause to national security. Unauthorized disclosure could reasonably be expected to cause (1) "damage," in the case of confidential information; (2) "serious damage," in the case of secret information; and (3) "exceptionally grave damage," in the case of top secret information. To ensure the trustworthiness and reliability of personnel in positions with access to classified information, government agencies rely on a multiphased personnel security clearance process that includes the application submission phase, investigation phase, and adjudication phase. * The application submission phase. A security officer from an agency (1) requests an investigation of an individual requiring a clearance; (2) forwards a personnel security questionnaire (standard form 86) using OPM's e-QIP system or a paper copy of the standard form 86 to the individual to complete; (3) reviews the completed questionnaire; and (4) sends the questionnaire and supporting documentation, such as fingerprints, to OPM or the investigation service provider. * The investigation phase. Federal investigative standards and OPM's internal guidance are used to conduct and document the investigation of the applicant.[Footnote 30] The scope of information gathered in an investigation depends on the level of clearance needed and whether an investigation for an initial clearance or reinvestigation for a clearance renewal is being conducted.[Footnote 31] For example, the federal standards require that investigators collect information from national agencies, such as the Federal Bureau of Investigation, for all initial and renewal clearances. For an investigation for a confidential or secret clearance, investigators gather much of the information electronically. For an investigation for a top secret clearance, investigators gather additional information through more time-consuming efforts, such as traveling to conduct in-person interviews to corroborate information about an applicant's employment and education. After the investigation is complete, the resulting investigative report is provided to the agency. According to the Performance Accountability Council's Strategic Framework, for the purposes of IRTPA timeliness reporting, investigative time is the time in days from the receipt date of the completed personnel security package by the investigative service provider to the date the final investigative file is forwarded to the adjudicative facility if sent electronically. * The adjudication phase. Adjudicators from an agency use the information from the investigative report to determine whether an applicant is eligible for a security clearance. To make clearance eligibility decisions, federal requirements specify that adjudicators consider guidelines in 13 specific areas that elicit information about (1) conduct that could raise security concerns and (2) factors that could allay those security concerns and permit granting a clearance. According to the Performance Accountability Council's Strategic Framework, for the purposes of IRTPA timeliness reporting, adjudicative time is the time in days from the date the final investigative file is forwarded (or received electronically) to the adjudicative unit to the date of the adjudicative decision. * Separate from, but related to, security clearances, are suitability determinations. Executive branch agencies conduct additional suitability investigations for individuals to ensure that they are suitable for employment in certain positions.[Footnote 32] For example, the Department of Justice conducts additional suitability checks to ensure applicants for jobs with the Drug Enforcement Agency have not used drugs. In addition, Health and Human Services conducts additional suitability investigations on applicants for jobs working with children. Similarly, the Intelligence Community requires a polygraph evaluation, among other things, to determine suitability for most positions. In light of long-standing delays and backlogs in processing security clearances, Congress set goals and established requirements for improving the clearance process in the Intelligence Reform and Terrorism Prevention Act of 2004. In 2005, GAO designated DOD's personnel security clearance program as a high risk area.[Footnote 33] As can be seen in figure 1, a number of steps have been taken to reform the process, including: * Role of the Office of Management and Budget in security clearance process. In June 2005, the President issued an executive order as part of the administration's efforts to improve the security clearance process and implement the statutory clearance requirements in IRTPA.[Footnote 34] This order tasked the Director of OMB with a variety of functions in order to ensure that agency processes relating to determining eligibility for access to classified national security information were appropriately uniform, centralized, efficient, effective, timely, and reciprocal. These actions included taking a lead role in preparing a November 2005 plan to improve the timeliness of personnel security clearance processes governmentwide. * Formation of the Joint Reform Team. The Joint Security Process Reform Team, also known as the Joint Security and Suitability Reform Team or Joint Reform Team, formed in June 2007, was established by the Director of National Intelligence and Under Secretary of Defense for Intelligence through a memorandum of agreement to execute joint reform efforts to achieve IRTPA timeliness goals and improve the processes related to granting security clearances and determining suitability for government employment. Agencies included in this governmentwide reform effort are ODNI, DOD, OMB, and OPM. The Joint Reform Team continues to work on the reform effort under the Performance Accountability Council by providing progress reports, recommending research priorities, and overseeing the development and implementation of an information technology strategy, among other things. Since its formation, the Joint Reform Team under the Performance Accountability Council: (1) Submitted an initial reform plan to the President on April 30, 2008. The plan proposed a new process for determining clearance eligibility that departs from the current system in a number of ways, including the use of a more sophisticated electronic application, a more flexible investigation process, and the establishment of ongoing evaluation procedures between formal clearance investigations. The report was updated in December 2008 to include an outline of reform progress and further plans. (2) Issued an Enterprise Information Technology Strategy to support the reformed security and suitability process in March 2009. According to the report, the Joint Reform Team is pursuing an approach that leverages existing systems and capabilities, where applicable, and developing new tools where necessary. * Formation of the Performance Accountability Council. Executive Order 13467 established the leadership structure for security and suitability reform headed by the Suitability and Security Clearance Performance Accountability Council as the entity responsible for aligning security and suitability, holding agencies accountable for implementation, and overseeing progress toward the reformed vision. [Footnote 35] This executive order directed, among other things, that executive branch policies and procedures be aligned and use consistent standards, to the extent possible, for investigating and adjudicating whether an individual is (1) suitable for government employment, (2) fit to be a contract employee, or (3) eligible for access to classified information. The Performance Accountability Council is accountable to the President to achieve reform goals and also oversees newly designated Security and Suitability Executive Agents. The executive order designated the Director of National Intelligence as the Security Executive Agent, the Director of OPM as the Suitability Executive Agent, and the Deputy Director for Management at OMB as the chair of the council with the authority to designate officials from additional agencies to serve as members. The council currently comprises representatives from 11 executive agencies. In May 2010, the Performance Accountability Council proposed quality measures to address the different phases of the application process including validating need, e-application, investigation, and adjudication. The measures also include the responsible organization, population covered, collection method, and whether it is a current or future measure. * Strategic Framework. The Performance Accountability Council issued a Strategic Framework in February 2010 to articulate the goals of the security and suitability process reform. The Strategic Framework sets forth a mission and strategic goals, performance measures, a communications strategy, roles and responsibilities, and metrics to measure the quality of security clearance investigations and adjudications. Figure 1: Key Events Related to the Security Clearance Reform Effort: [Refer to PDF for image: time line] December 17, 2004: Intelligence Reform and Terrorist Prevention Act passed. January 2005: Government Accountability Office places Department of Defense’s clearance program on its high-risk list. June 27, 2005: Executive Order 13881 designates the Office of Management and Budget the single entity to ensure centralization, uniformity, and reciprocity of security clearance policies. November 2005: Office of Management and Budget issues a plan for improving the security clearance process. June 25, 2007: The Joint Reform Team is formed to develop a plan for clearance reform, including research priorities and an information technology strategy, to achieve IRTPA goals. April 30, 2008: The Joint Reform Team issues a report on reforming the security clearance and suitability process. December 18, 2008: The Joint Reform Team issues a report outlining reform progress and further plans. June 30, 2008: Executive Order 13467 establishes the Performance Accountability Council to drive implementation of the reform effort and designated the Office of Management and Budget’s Deputy Director for Management as Chair. March 17, 2009: The Joint Reform Team issues an Enterprise Information Technology Strategy to support the reformed security and suitability process. February 16, 2010: The Performance Accountability Council issues a strategic framework to articulate the goals of the security and suitability process reform. May 31, 2010: The Performance Accountability Council develops quality measures[A] that it believes will identify specific quantifiable targets linked to goals that are intended to be measured objectively and ultimately gauge progress and assess the quality of the personnel security clearance process. Source: GAO analysis. [A] The Quality Measures are proposed measures. [End of figure] Significant Overall Progress Has Been Made to Improve Timeliness, but Some Executive Agencies Continue to Face Challenges in Meeting Timeliness Objectives: Timeliness Varies Across Agencies: The government has reported that significant overall progress has been made to improve the investigation and adjudication of personnel security clearance applications in a timely manner. This is largely attributable to DOD, whose clearances comprise a vast majority of governmentwide initial clearances. IRTPA required the executive branch to develop a plan under which, to the extent practical, each authorized adjudicative agency would be required to make a determination on at least 90 percent of initial security clearances within an average of 60 days by December 17, 2009.[Footnote 36] Within this 60-day period, IRTPA also includes periods of 40 days for investigations and 20 days for adjudications.[Footnote 37] As can be seen in figure 2, according to the Performance Accountability Council's February 2010 annual report to Congress,[Footnote 38] during the first quarter of fiscal year 2010, two agencies--the National Geospatial-Intelligence Agency and the National Reconnaissance Office-- met the timeliness requirement for investigations, seven agencies--the Departments of Defense, Energy, Health and Human Services, the Defense Intelligence Agency, the National Security Agency, the Federal Bureau of Investigation, and the Department of State--met the timeliness objectives for adjudications, and five agencies--the Department of Defense, Department of Energy, the National Geospatial-Intelligence Agency, the National Reconnaissance Office, and the Department of State--met the 60-day IRTPA timeliness objective.[Footnote 39] Furthermore, we found that one of the agencies included in our review-- the National Geospatial-Intelligence Agency--met all of the IRTPA timeliness objectives for the second and third quarter, while the Defense Intelligence Agency met all of the IRTPA timeliness objectives in the second quarter and DOD, which comprises the vast majority of clearances, and the Federal Bureau of Investigation, met all of the IRTPA timeliness objectives in the third quarter of fiscal year 2010. We also found that timeliness varied widely among executive branch agencies. During the first three quarters of fiscal year 2010, the average for the fastest 90 percent of cases adjudicated by the 14 agencies included in our review ranged from 22 to 96 days for investigation timeliness, 2 to 59 days for adjudication timeliness, and 30 to 154 days for IRTPA timeliness.[Footnote 40] Agency officials that we spoke with largely attributed the wide variation between these agencies to variances in the adoption of information technology. According to OPM officials, timeliness varies for the agencies that use OPM as the investigative service provider due, in part, to differences in agency adoption of information technology, such as the e-QIP that speeds up investigation timeliness by providing OPM with more complete and better quality data earlier in the process.[Footnote 41] With regard to adjudication timeliness, five of the agencies we included in our review have developed electronic delivery, electronic adjudication, or case management and workflow tools to improve timeliness, while others have not. Figure 2: Timeliness for the First Three Quarters of Fiscal Year 2010: Average of the Fastest 90 Percent of Initial Clearance Cases for Select Executive Branch Agencies: [Refer to PDF for image: illustrated table] No delegated authority[A]: Department of Defense[B]: Investigations (40 days): First quarter: 42 days; Second quarter: 45 days; Third quarter: [Check]; Adjudication (20 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]; Combined (60 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]. Department of Homeland Security: Investigations (40 days): First quarter: 48 days; Second quarter: 51 days; Third quarter: 49 days; Adjudication (20 days): First quarter: 48 days; Second quarter: 59 days; Third quarter: 57 days; Combined (60 days): First quarter: 96 days; Second quarter: 110 days; Third quarter: 106 days. Department of Energy: Investigations (40 days): First quarter: 47 days; Second quarter: 45 days; Third quarter: 44 days; Adjudication (20 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]; Combined (60 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]. Department of Justice: Investigations (40 days): First quarter: 60 days; Second quarter: 68 days; Third quarter: 63 days; Adjudication (20 days): First quarter: 42 days; Second quarter: 44 days; Third quarter: 28 days; Combined (60 days): First quarter: 102 days; Second quarter: 112 days; Third quarter: 91 days. Department of the Treasury: Investigations (40 days): First quarter: 54 days; Second quarter: 56 days; Third quarter: 52 days; Adjudication (20 days): First quarter: 54 days; Second quarter: 27 days; Third quarter: 46 days; Combined (60 days): First quarter: 108 days; Second quarter: 83 days; Third quarter: 98 days. Department of Health and HUman Services: Investigations (40 days): First quarter: 52 days; Second quarter: 53 days; Third quarter: 47 days; Adjudication (20 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]; Combined (60 days): First quarter: 65 days; Second quarter: 70 days; Third quarter: [Check]. Department of Veterans Affairs: Investigations (40 days): First quarter: 54 days; Second quarter: 78 days; Third quarter: 70 days; Adjudication (20 days): First quarter: 31 days; Second quarter: [Check]; Third quarter: 26 days; Combined (60 days): First quarter: 85 days; Second quarter: 93 days; Third quarter: 96 days. Delegated authority[A]: Defense Intelligence Agency: Investigations (40 days): First quarter: 55 days; Second quarter: [Check]; Third quarter: 49 days; Adjudication (20 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]; Combined (60 days): First quarter: 80 days; Second quarter: 68 days; Third quarter: 78 days. National Security Agency[C]: Investigations (40 days): First quarter: 70 days; Second quarter: 59 days; Third quarter: 49 days; Adjudication (20 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]; Combined (60 days): First quarter: 80 days; Second quarter: 68 days; Third quarter: [Check]. National Geospatial-Intelligence Agency; Investigations (40 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]; Adjudication (20 days): First quarter: 31 days; Second quarter: [Check]; Third quarter: [Check]; Combined (60 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]. Central Intelligence Agency: Investigations (40 days): First quarter: 78 days; Second quarter: 85 days; Third quarter: 96 days; Adjudication (20 days): First quarter: 49 days; Second quarter: 47 days; Third quarter: 58 days; Combined (60 days): First quarter: 127 days; Second quarter: 132 days; Third quarter: 154 days. Federal Bureau of Investigations: Investigations (40 days): First quarter: 76 days; Second quarter: 75 days; Third quarter: [Check]; Adjudication (20 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]; Combined (60 days): First quarter: 82 days; Second quarter: 78 days; Third quarter: [Check]. National Reconnaissance Office: Investigations (40 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]; Adjudication (20 days): First quarter: 31 days; Second quarter: 58 days; Third quarter: 36 days; Combined (60 days): First quarter: [Check]; Second quarter: 85 days; Third quarter: 62 days. Department of State: Investigations (40 days): First quarter: 43 days; Second quarter: 47 days; Third quarter: 48 days; Adjudication (20 days): First quarter: [Check]; Second quarter: [Check]; Third quarter: [Check]; Combined (60 days): First quarter: [Check]; Second quarter: 54 days; Third quarter: [Check]. Source: Performance Accountability Council data. [Note: The Data provided by the Performance Accountability Council was provided in August 2010. We assessed the reliability of the data and determined that the data are sufficiently reliable for the purposes of our report. [A] Agencies without delegated authority rely on OPM to conduct their background investigations while agencies with delegated authority have been authorized to conduct their own background investigations. As such, timeliness data for agencies without delegated authority is a reflection of OPM's timeliness. [B] DOD cases account for a vast majority of clearances. The Performance Accountability Council timeliness reports on initial clearances include DOD secret/confidential renewal cases. A prior GAO review and OPM officials' estimates of DOD clearance timeliness in fiscal year 2009 indicated that confidential and secret level clearances, whether initial or renewal, generally took the same amount of time to investigate. Furthermore, the Defense Personnel Security Research Center--a Department of Defense entity dedicated to improving the effectiveness, efficiency, and fairness of the DOD personnel security system--issued a working paper that showed that average adjudication timeliness did not substantially differ between initial and renewal secret clearance cases for DOD using first, second, and third quarter data for fiscal year 2008. [C] According to National Security Agency officials, due to the nature of the National Security Agency's initiation and investigation requirements, reported investigation times include additional steps, such as suitability determination investigations. [End of figure] Agencies Have Made Efforts to Improve Timeliness for Processing Security Clearances: The requirements established by IRTPA have resulted in a governmentwide focus on improving the timeliness of initial security clearances through the Performance Accountability Council. In addition, several of the agency officials with whom we spoke reported that their agencies prioritize timeliness for security clearances. For example, several agency officials noted that the passage of IRTPA was an important factor leading to continued senior level leadership commitment, involvement, and oversight over timeliness reform through the Performance Accountability Council. Moreover, IRTPA's annual reporting requirements have provided more information about agency timeliness to Congress, allowing for more oversight and increasing transparency and accountability. However, IRTPA does not set timeliness requirements for suitability determinations, Homeland Security Presidential Directive-12 investigations,[Footnote 42] and security clearance renewals. According to agency officials we spoke to, their agencies often prioritize initial security clearances for processing. Governmentwide efforts to improve the timeliness of personnel security clearance processing have focused on technology solutions. For example, the Joint Reform Team and the Performance Accountability Council have encouraged agencies to utilize information technology solutions, such as e-QIP, electronic delivery, and electronic adjudication capabilities to enhance automation.[Footnote 43] E-QIP facilitates more complete collection of a subject's information upfront in the process and reduces errors, which lowers, on average, the time it takes for investigators to clarify the information provided. Electronic delivery reduces the adjudicative phase by eliminating delays in receiving investigative reports related to mail and courier services, such as the need at certain agencies to irradiate all incoming mail. Electronic adjudication systems use automation to review investigative reports for missing information and adjudicate the cases, under certain conditions, within seconds. Agency officials indicated that as agencies have adopted these capabilities, timeliness improved. In addition, OPM, which performs approximately 94 percent of initial clearance investigations for the federal government, has also taken steps to improve timeliness. For example, according to OPM officials, OPM also made information technology enhancements to improve its processes, such as enabling electronic delivery. Aside from these governmentwide efforts, some agency officials stated that their agencies have taken steps to improve adjudication timeliness. DOD, for example, developed and implemented an electronic case management system--the Clearance Adjudication Tracking System-- within several of its Central Adjudication Facilities.[Footnote 44] In 2009, the Army began electronically adjudicating secret clearances through the Clearance Adjudication Tracking System, which was a significant factor in improving the Army's adjudicative average timeliness. For example, according to the Performance Accountability Council's Strategic Framework, the average of the fastest 90 percent of initial clearance adjudications for the Army fell from 187 days in the second quarter of fiscal year 2009 to 10 days in the first quarter of fiscal year 2010. The Department of Energy also took steps to enhance timeliness. For example, in addition to utilizing electronic delivery and e-QIP, the Department of Energy developed corrective action plans, implemented case prioritization procedures, and created a tiered adjudication structure to clear easier cases quickly while utilizing a complex case review board to address complex cases in a timely manner. In addition, the Department of Energy built timeliness performance into adjudicator evaluations, reduced the number of people involved with deciding cases, and increased manpower to meet workload requirements. Agencies Continue to Face Several Challenges to Meeting Timeliness Objectives: Despite the actions that have been taken to improve timeliness, agency officials with whom we spoke identified several remaining challenges to meeting IRTPA's timeliness objectives. These challenges include agency-specific issues, such as resource constraints and manpower limitations. For example: * Resource constraints are a limiting factor for several agencies in implementing certain information technology capabilities, such as electronic delivery, case management, and workflow tools. For example, Defense Intelligence Agency officials indicated that they are constrained in implementing a key information technology that provides electronic delivery, case management, and workflow tool capabilities. Furthermore, some agencies, especially those with relatively small clearance caseloads, find it difficult to justify large investments to develop and implement information technology systems. * Personnel limitations, such as personnel shortages or increased workloads, were also identified by several agency officials as an ongoing challenge. Some agency officials stated that their agencies already have or expect to experience personnel shortages. For example, officials from the Department of Homeland Security stated that a lack of resources is the primary issue for not meeting the timeliness objectives, but the Department of Homeland Security headquarters is currently backfilling 10 vacant adjudicator positions, which should help to alleviate the problem. In addition, some agency officials stated that their agency staff is subject to workload increases, such as periods of increased agency hiring, spikes in security clearance renewal cases, or additional duties related to corollary requirements. For example, in 2008, Homeland Security Presidential Directive-12 directed the implementation of a common governmentwide identification standard for federal employees and contractors, under which federal agencies have been required to begin issuing common identification and access badges for all individuals, including contractors, who need access to government facilities or computer networks. These badge requirements, while different from those required for security clearances, expanded the pool of staff needing investigations and adjudicative determinations. These issues are particularly challenging in places where staff already perform clearance processes as a collateral duty. We found other challenges to meeting timeliness objectives that were the result of systemic issues involving interagency and intergovernmental activities. Agencies are often unable to control certain processes in order to meet timeliness objectives when they are dependent on information or action from other governmental entities. For example: * Information-sharing between agencies is an ongoing challenge that can manifest itself in several ways. First, investigative agencies are not in direct control of the timeliness and completeness of Federal Bureau of Investigation, state, and local law enforcement fingerprint and criminal investigation checks. For example, the results of Federal Bureau of Investigation criminal investigation checks often are returned with a classification listed as "No Pertinent," which indicates that there is no pertinent information relevant to making a clearance eligibility determination. Some agency officials with whom we spoke indicated that this type of response leaves adjudicators with incomplete information due to the potential that the designation is either the result of a subjective judgment from an outside party as to what they believe is relevant information or a placeholder to indicate that more information is potentially available, but pending or not releasable. Second, officials said the lack of digitization of records at certain federal, state, and local agencies can be a challenge to gathering information for timely completion of investigations and adjudicative decisions. When personnel files, for example, are not stored, catalogued, and made searchable through electronic means, agencies are limited by manual checks. Finally, delays and incomplete information may occur in obtaining information from intelligence agencies. For example, some agency officials with whom we spoke stated that since they do not have direct access to clearance-related information and databases for agencies in the Intelligence Community, they rely upon manual requests for information. * Investigation services quality and cost is an ongoing challenge to meeting timeliness objectives, according to agencies officials. For example, officials representing the Departments of Homeland Security, Energy, the Treasury, Justice, and four DOD component agencies [Footnote 45] that utilize OPM as their investigative service provider cited challenges related to deficient investigative reports as a factor that slows agencies' abilities to make adjudicative decisions. The quality and completeness of investigative reports directly affects adjudicator workloads, including whether additional steps are required before adjudications can be made, as well as agency costs. For example, some agency officials we spoke with noted that OPM investigative reports do not include complete copies of associated police reports and criminal record checks. According to ODNI and OPM officials, OPM investigators provide a summary of police and criminal reports and assert that there is no policy requiring inclusion of copies of the original records. However, ODNI officials also stated that adjudicators may want or need entire records as critical elements may be left out. For example, according to Defense Office of Hearings and Appeals officials, in one case, an investigator's summary of a police report incorrectly identified the subject as a thief when the subject was actually the victim. If the Defense Office of Hearings and Appeals had access to actual police documents, officials believe the adjudication process would be more efficient. We noted in our prior work that documentation was incomplete for most OPM-provided investigative reports based on independent review of about 3,500 investigative reports.[Footnote 46] We also noted in our previous work that incomplete investigative documentation may lead to increases in the time it takes to complete the clearance process and the overall costs of the process.[Footnote 47] Several agency officials stated that in order to avoid further costs or delays they often choose to perform additional steps internally to obtain missing information, clarify or explain issues identified in investigative reports, or gather evidence for issue resolution or mitigation. Finally, a significant challenge to meeting timeliness objectives specific to Intelligence Community agencies involve addressing the requirements that are unique to these agencies. For example, since most positions in Intelligence Community agencies require top secret clearances with Sensitive Compartmented Information access, intelligence agencies rely almost exclusively on Single Scope Background Investigations that are required for these types of clearances. These investigations have higher requirements for the types and numbers of sources of information required compared to investigations for secret or confidential clearances. According to agency officials, these higher requirements take longer, on average, to investigate and adjudicate. In addition, timeliness for intelligence agencies is often complicated by the unique issues presented by extensive suitability determination processes and precise conditions of employment that may include medical exams, psychological evaluations, drug testing, and polygraph exams. Polygraph exams, for example, may generate additional leads that require further investigative work. Moreover, agency officials also stated that scheduling a polygraph with an individual, especially if they live far from agency offices, may add months to investigation timelines. Performance Accountability Council Has Not Reported on Impediments to Meeting Timeliness Objectives or Plans to Address Impediments: While the Performance Accountability Council, responsible for driving implementation of the reform effort and ensuring accountability, has taken steps to assist in implementation of reform efforts, it has not reported on the impediments to meeting timeliness objectives or plans to address impediments. IRTPA's security clearance reform provision requires annual reports to the appropriate congressional committees-- through 2011--on the progress made during the preceding year toward meeting its requirements, including timeliness data and a discussion of any impediments to the smooth and timely functioning of its requirements. However, in its most recent report to Congress, the Performance Accountability Council did not provide information on the impediments agencies face in meeting timeliness objectives or plans to address impediments. While the Office of the Director of National Intelligence, in its capacity as Security Executive Agent, has performed a limited number of oversight audits, according to officials at four agencies we met with, the Performance Accountability Council has not met with them to identify the impediments to meeting the timeliness objectives. The Performance Accountability Council has focused its efforts on DOD in part due to DOD's security clearance program's designation as one of GAO's high-risk areas, as well as the fact that DOD clearances comprise the overwhelming majority of initial clearance cases that are processed annually. We found that due to the relative size of DOD's clearance program, DOD's progress towards meeting IRTPA's timeliness objectives is a significant factor in reducing the average time required for initial security clearance processing for the government as a whole. Furthermore, Performance Accountability Council officials stated that they will begin conducting one-on-one meetings with individual agencies in September 2010 to enhance communication, assist in implementation planning, and provide a feedback mechanism for agency stakeholders to communicate information and needs to the Joint Reform Team. The Performance Accountability Council is in a position to identify certain trends and commonalities, such as those challenges related to resource constraints, manpower limitations, information-sharing, investigation services quality and cost, and Intelligence Community specific issues. However, absent complete reporting on the impediments on meeting timeliness objectives, Congress may not have visibility over agency compliance and decision makers may not have a complete picture of the progress made or the impediments to meeting timeliness objectives. This potential lack of agency transparency and accountability may impact continued efforts to improve timeliness and prevent scrutiny over agencies that are not meeting timeliness objectives. Executive Agencies Often Grant Reciprocity, Although Challenges Exist to Measuring and Tracking Reciprocity: Executive Agency Officials Reported That They Routinely Honor Another Agency's Security Clearance, but Additional Steps May Be Taken before Granting Reciprocity: Officials representing executive branch agencies, including those within the Intelligence Community, stated that they routinely grant reciprocity (i.e., accept a background investigation or clearance determination completed by another authorized investigative or adjudicative agency). IRTPA generally requires that all security clearance investigations and determinations be accepted by all agencies, with limited exceptions when necessary for national security purposes. We have reported in the past that, according to the government's plan for addressing problems in the personnel security clearance process, security clearances are not fully accepted governmentwide.[Footnote 48] A recent congressional committee report also suggests that even among the elements of the Intelligence Community, there are impediments and sometimes lengthy delays in granting clearances to employees detailed from one agency to another. [Footnote 49] However, in October 2008, the ODNI issued guidance on the reciprocity of personnel security clearances.[Footnote 50] The guidance requires, except in limited circumstances, that all Intelligence Community elements "accept all in-scope security clearance or access determinations." Further, OMB guidance[Footnote 51] requires agencies to honor a clearance when: (1) the prior clearance was not granted on an interim or temporary basis, (2) the prior clearance investigation is current and in-scope,[Footnote 52] (3) there is no new derogatory information, and (4) there are no conditions, deviations, waivers, or unsatisfied additional requirements (such as polygraphs) if the individual is being considered for access to highly sensitive programs.[Footnote 53] Moreover, officials representing two agencies in our review noted that it is in their best interest to accept a prior clearance because reciprocity saves time, money, or manpower. Although officials agreed that they routinely honor another agency's security clearance, we found that some agencies find it necessary to take additional steps to address limitations with available information. Officials representing 18 of the 21 organizations we met with to discuss reciprocity reported that they must address limitations, such as insufficient information in the databases or variances in the scope of investigations, before granting reciprocity. For example: * Insufficient information. Although there is no single, integrated database, security clearance information is shared between OPM, DOD, and, to some extent, Intelligence Community databases. OPM has taken steps to ensure certain clearance data necessary for reciprocity is available to adjudicators. For example, in April 2010, OPM held an interagency meeting to determine new data fields to include in their shared database to more fully support reciprocity. However, we found that the shared information available to adjudicators contains summary- level detail that may not be complete. As a result, agencies may take steps to obtain additional information, which creates challenges to immediately granting reciprocity. For example, to accept a clearance granted by an intelligence agency, a non-intelligence agency must access information from the intelligence agencies' Scattered Castles database. However, according to officials representing the Department of the Treasury, the Department of Justice, and the Joint Chiefs of Staff, the Scattered Castles database does not always provide enough detail to immediately grant reciprocity. According to these officials, the Scattered Castles summary screen is not detailed enough or does not include key information, such as the steps taken to mitigate negative issues. As a result, additional information, such as copies of the original background investigation, must be sought directly from intelligence agencies to verify and provide supporting detail to the information available in Scattered Castles. Similarly, to accept a clearance granted by a non-intelligence agency, an intelligence agency must access information from non-intelligence agency databases. Officials representing Intelligence Community agencies with whom we spoke noted, for example, that they must contact DOD to determine if an actual clearance was granted and verify the current status of the applicant because such detail is not available in DOD's Joint Personnel Adjudication System. Similarly, officials representing the Department of Justice told us that while OPM's Central Verification System shows the existence of conditions, deviations, and waivers, Department of Justice officials follow up as appropriate with the agency that granted the clearance. * Variances in the scope of investigations. We found that the scope of background investigations varies by level of clearance, which may lead to duplicative work. For example, a person with a secret-level clearance may have had one of several types of background investigations and the scope of the background investigation may vary depending on the type of clearance sought. Further, officials from two agencies we spoke with told us that they typically require a certain type of background investigation and when a subject's clearance is based on a different type of investigation, they may take additional steps to fill in the missing gaps to ensure the scope is consistent with their expectations. Officials representing other agencies included in our review told us that when the subject's existing background investigation is different from the required investigation type, the agency will request a new background investigation. For example, officials at one agency stated that positions of public trust sometimes have higher suitability information requirements than information available from confidential/secret background investigations. Similarly, officials at another agency stated that because there are two types of investigations for secret/confidential clearances based on whether the person is military or contractor or government civilian, the agency may not be able to accept an investigation if it is the wrong one for that particular position. When an entirely new investigation is performed, we found that the current system may lead to duplicative work, limiting reciprocity. In a 2008 report to the President, the Joint Reform Team, under the Performance Accountability Council, proposed revised investigative standards to, among other things, reduce the types of initial investigations from 15 to 3.[Footnote 54] While originally planned for release in December 2010, the Performance Accountability Council extended plans to issue a new version of the revised Federal Investigative Standards to calendar year 2011. In addition to addressing limitations with available information, agency officials identified broader challenges to granting reciprocity. Officials representing 14 of the 21 agencies included in our review of reciprocity reported that challenges, such as the need to conduct suitability determinations or determine whether a prior clearance investigation and adjudication meets their quality expectations, must be addressed before granting reciprocity. For example: * Conducting suitability determinations. All federal agencies may be required to conduct basic suitability determinations to ensure the applicant's character or conduct is appropriate for the position in question, but some agencies take additional actions to determine suitability before they reciprocate a security clearance. For example, the Department of Justice must take steps to ensure that applicants for jobs with the Drug Enforcement Administration have not used drugs, according to agency officials. Similarly, the Intelligence Community requires a polygraph evaluation, among other things, to determine suitability for most positions, according to intelligence officials. We also found that agencies have varying standards for determining suitability of applicants before reciprocating a security clearance. For example, Department of Health and Human Services officials said they will not accept a prior security clearance until it makes a favorable determination of suitability. Similarly, the Department of Justice will only accept another agency's clearance and hire the applicant on a probationary period pending a favorable suitability determination. As a result of the variances in determining suitability, OPM, as the Suitability Executive Agent for all executive agencies, and the Joint Reform Team have issued guidance in line with Executive Order 13488, which mandates, to the extent practicable and with certain exceptions, reciprocal recognition of prior favorable suitability determinations.[Footnote 55] For example, OPM issued a memorandum for the Heads of Executive Departments and Agencies that explains how to implement the Executive Order.[Footnote 56] * Determining whether a prior clearance investigation and adjudication meets standards. Most agency officials we spoke with stated that since there is no governmentwide standardized training and certification process for investigators and adjudicators, a subject's prior clearance investigation and adjudication may not meet the standards of the inquiring agency. Although OPM has developed some training, security clearance investigators and adjudicators are not required to complete a certain type or number of classes. As a result, the extent to which investigators and adjudicators receive training varies by agency. For example, according to ODNI officials, all DOD adjudicators working at DOD Central Adjudication Facilities must take a basic 2- week adjudicator course and subsequently the 1-week advanced course after some time on the job. However, according to officials we spoke with, the Air Force has an additional requirement for adjudicators to attend a 3-week training course while the Defense Industrial Security Clearance Office relies on on-the-job training. Other agencies have different requirements. For example, the Department of Energy relies on a mandatory annual security refresher. Consequently, as we have previously reported, agencies are reluctant to be accountable for investigations and/or adjudications conducted by other agencies or organizations.[Footnote 57] To achieve fuller reciprocity, clearance- granting agencies seek to have confidence in the quality of prior investigations and adjudications. The annual reports to Congress indicate that the Performance Accountability Council is taking steps to make investigations and adjudications more consistent across the government by standardizing the training of investigators and adjudicators.[Footnote 58] For example, the reports describe the development of core courses, as well as a formalized certification for investigators and adjudicators. According to senior leaders of the reform effort, these steps will facilitate reciprocal acceptance of clearance decisions governmentwide. In the Absence of Consistent Metrics and Reporting Requirements, the Extent to Which Reciprocity Is Granted Is Unknown: Although agency officials have stated that reciprocity is regularly granted, agencies do not have complete records on the extent to which previously granted security clearance investigations and adjudications are honored governmentwide. While the Performance Accountability Council has identified reciprocity as a governmentwide strategic goal, we found that agencies do not consistently and comprehensively track when reciprocity is granted, and lack a standard metric for tracking reciprocity. For example, Department of Justice and Department of Energy officials said they track both when reciprocity is granted and reasons for denying a previously granted security clearance, while Navy and Department of the Treasury officials said they only document when reciprocity is granted and not when reciprocity is denied. The Navy checks a box in its electronic database, and the Department of Energy and the Department of the Treasury manually track when reciprocity is honored. In contrast, the Army and Air Force do not track reciprocity at all, according to agency officials. Moreover, it is unclear the extent to which agencies that do track reciprocity are reporting the data to oversight agencies, such as ODNI, or sharing information on reciprocity with each other.[Footnote 59] OPM and the Performance Accountability Council have developed quality metrics for reciprocity, but the metrics do not measure the extent to which reciprocity is being granted. We previously reported that developing metrics for assessing and regularly monitoring all aspects of the clearance process could add value in current and future reform efforts as well as supply better information for greater congressional oversight.[Footnote 60] While the existing metrics are a positive step, more is needed to comprehensively capture the extent to which reciprocity is being granted. For example, OPM created a metric in early 2009 to track reciprocity, but this metric measures limited information. OPM's metric measures the number of investigations requested from OPM that are rejected based on the existence of a previous investigation and does not track the number of cases in which reciprocity was or was not successfully honored. The Performance Accountability Council developed quality metrics, including metrics to track reciprocity, in response to a March 2010 congressional inquiry. For example, the Performance Accountability Council proposes as a metric the average percentage of cases for which prior database checks are conducted as reported by executive branch agencies. However, this metric does not account for agencies that checked other databases and relies on agency self-reporting rather than a systematic method of data collection. Although the metric helps to create an overall picture of reciprocity, it does not track which cases were and were not reciprocated. Similarly, the other metrics included in the Performance Accountability Council's proposal, such as the number of duplicate requests for investigations, percentage of applications submitted electronically, number of electronic applications submitted by applicant but rejected by OPM as unacceptable due to missing information or forms, and percentage of fingerprint submissions determined to be "unclassifiable" by the Federal Bureau of Investigation, provide useful information, but do not track the extent to which reciprocity is or is not ultimately honored. Without comprehensive, standardized metrics to track reciprocity and consistent documentation of the findings, decision makers will not have a complete picture of the extent to which reciprocity is granted or the challenges that agencies face when attempting to honor previously granted security clearances: Although There Are No Plans to Develop a Single, Integrated Database, Steps Have Been Taken to Upgrade Existing Systems and Increase Information Sharing: The Executive Branch Has Opted to Leverage Existing Systems in Lieu of a Single, Integrated Database: Tasked with establishing a single, integrated database, the executive branch has opted to focus on leveraging existing systems rather than establish a new database. IRTPA required that not later than 12 months after the date of enactment of the act, the Director of the Office of Personnel Management and the Director of the Office of Management and Budget establish and commence operating and maintaining a single, integrated database of security clearance information. This database was to house information regarding the granting, denial, or revocation of security clearances or access pertaining to military, civilian, and contractor personnel, from all authorized investigative and adjudicative agencies.[Footnote 61] Information from this database would be used to validate whether a person has or had a clearance, potentially including such information as the type of investigation that was conducted and the date of the investigation, thereby assisting responsible officials in determining whether a new investigation is required. However, the Performance Accountability Council is not pursuing a single, integrated database according to our analysis of a series of recent reports that the Joint Reform Team, under the Performance Accountability Council, issued between 2008 and 2010.[Footnote 62] For example, according to the Enterprise Information Technology Strategy, the Performance Accountability Council has opted to pursue an approach that leverages existing systems and involves the development of new tools when necessary. [Footnote 63] According to the Strategic Framework, which was included with the most recent annual report to Congress, the reform efforts are focused on leveraging OPM's existing system--the Central Verification System--to enable access to records on investigations and adjudications.[Footnote 64] Agency officials from both OPM and ODNI confirmed that there are no plans to create a new single, integrated database. Instead, the focus will be on using a single search capability of existing databases as the means by which they intend to address the IRTPA requirement. According to an OPM official with whom we spoke, a single database would not provide any additional functionality over the single-search capability that they are pursuing. OPM, DOD, and ODNI officials with whom we spoke explained that establishing, operating, and maintaining a single, integrated database is not a viable option due to concerns related to privacy, security, and data ownership. First, DOD and OPM mentioned privacy concerns, which involve the unintentional disclosure of personal identifying information, such as name and Social Security number.[Footnote 65] Second, merging the different systems into one database raises security concerns. For example, according to an ODNI official, since the Intelligence Community's database is classified and separate from the databases used by non-intelligence agencies, even an aggregation of unclassified information from its database could lead to unintentional disclosure of personal identifying information that could compromise security. Moreover, breaches in the system could also compromise security. For example, some officials mentioned an enhanced threat from hackers if there were consolidation of multiple information technology systems. Finally, according to DOD officials, there are issues related to data ownership and the copying and transferring of information between systems that are owned by different agencies. For example, according to OPM officials, OPM can not provide information from investigations it did not conduct to another agency. When investigations are conducted by agencies with delegated authority, the reports are owned and maintained by the investigating agency. Requests for these investigative records must be referred to the owning agency. Information from Two Primary Databases Can Be Accessed from a Single Entry Point: Although there are no plans to create a new governmentwide database, non-intelligence agencies in our review are sharing information about personnel who hold or are seeking security clearances through two main databases that can be accessed through a single entry point. Two primary databases are used by non-intelligence agencies to store investigative and adjudicative information and according to the Performance Accountability Council, they account for decisions on about 90 percent of all security clearance holders in the federal government. Data are stored in either OPM's Central Verification System or DOD's Joint Personnel Adjudication System. The Central Verification System includes security clearance data for all non- Intelligence Community, non-DOD executive branch agencies. The Joint Personnel Adjudication System is a repository for security clearance information on both DOD civilian and military personnel, as well as determinations of contractor clearance eligibility and access for the National Industrial Security Program. Data from the two databases can be searched and obtained from a single entry point in the Central Verification System.[Footnote 66] The Central Verification System was upgraded in spring 2010 and now provides access to more information than was previously accessible. Specifically, the upgraded system provides users with a summary of information on: * Characteristics of clearances reported to the system. This summary includes information on active, inactive, and denied clearances, as well as information on whether there is a condition, deviation, or waiver.[Footnote 67] * Characteristics of investigations reported to the system. This summary includes information on pending, closed, and discontinued investigations, as well as requests that were deemed unacceptable due to inadequate or inaccurate information. * Suitability and fitness. This summary provides information on adjudication decisions for suitability for federal employees and fitness for excepted service and contract employee determinations. [Footnote 68] * Homeland Security Presidential Directive-12 Personal Identification Verification Credentials.[Footnote 69] This summary includes information on the status of credentials issued to the subject indicating whether the credentials are active, suspended, revoked, administratively withdrawn, or other. * Polygraph data. This summary includes information on the type of polygraph conducted, including Counter-Intelligence or Expanded Scope, but does not include results from examinations.[Footnote 70] Intelligence Community Agencies Share Information through a Separate Database and Are Exploring Alternatives to Expand Information Sharing with Non-intelligence Agencies: According to ODNI officials and Intelligence Community Directive 704, the Intelligence Community agencies share information with one another through a separate classified database known as Scattered Castles. Scattered Castles is a repository for records from all intelligence agencies by which each agency uploads relevant information from individual agency databases. All personnel who have access to Sensitive Compartmented Information are listed in Scattered Castles. This system is not linked to OPM's Central Verification System due to concerns about protecting classified information. According to ODNI officials, the system has not been linked to non-intelligence databases due to the need to protect information on covert personnel. However, officials representing Intelligence Community agencies stated that they do enter some information from the Joint Personnel Adjudication System into Scattered Castles. Although the Intelligence Community maintains a separate database, we found that most of the non-intelligence agencies included in our review had some access to Scattered Castles. For example, five non- intelligence, non-DOD agencies included in our review had some access through a Sensitive Compartmented Information Facility located in their agency.[Footnote 71] All of the military departments, as well as the Joint Chiefs of Staff, also had some access.[Footnote 72] Moreover, according to agency officials, DOD adjudicators with the appropriate clearance and need to know will have access to a Sensitive Compartmented Information Facility with access to Scattered Castles when DOD collocates all of its clearance adjudication facilities at Fort Meade in Maryland as part of the DOD base realignment and closure process in 2011. According to Performance Accountability Council officials, the Performance Accountability Council is participating in an effort to explore ways to enhance information sharing between the Intelligence Community agencies and the non-intelligence agencies. A working group has been established to study alternatives to support a single access point from which to search clearance information and plans to complete its review in December 2010. According to an ODNI official, alternatives currently being considered include a help desk staffed with employees from the Intelligence Community who would have access to the Joint Personnel Adjudication System, Central Verification System, and Scattered Castles and could, upon request, provide the results of Scattered Castles searches to non-Intelligence Community agencies. Conclusions: Continued personnel security clearance reform relies on strong, committed executive leadership to sustain the momentum created by the current reform effort. This type of leadership commitment, in turn, helps provide oversight and accountability for the improvement processes. Key to these efforts has been the Performance Accountability Council, which has provided direction for clearance reform across the federal government. As a result of the Performance Accountability Council's actions, federal agencies have made progress in moving closer to the objectives and requirements outlined in IRTPA. Under the Performance Accountability Council's leadership, timeliness data--particularly at DOD--have improved, steps have been taken to improve information sharing, and there has been focus on honoring reciprocity of existing clearances. However, while agencies are moving closer to meeting the objectives and requirements of IRTPA, continued oversight and accountability for personnel security clearance reform is still needed. Specifically, executive branch agencies that are currently not meeting timeliness objectives may need help in identifying challenges and developing plans with appropriate timelines to overcome these obstacles. The recent activities undertaken by the Performance Accountability Council to assist the agencies in developing plans to implement the reformed approach is a step in the right direction. Continued reporting required by the Intelligence Authorization Act for Fiscal Year 2010 will also help ensure that momentum gained through the reform efforts will continue. However, without developing more comprehensive metrics to track reciprocity, executive branch agencies will not have a complete picture of the degree to which reciprocity is honored. Recommendations for Executive Action: To improve the overall personnel security reform efforts across the federal government, we recommend that the Deputy Director of Management, Office of Management and Budget, in the capacity as Chair of the Performance Accountability Council, take the following actions: * Collaborate with the agencies that are not meeting timeliness objectives to take the following five actions: * Identify challenges to timeliness; * Develop mitigation strategies to enable each agency to comply with the IRTPA timeliness objectives; * Set timelines for accomplishing the required actions; * Monitor agency progress; and: * Report on these plans and progress in the annual reports to Congress. * Develop comprehensive metrics to track reciprocity and then report the findings from the expanded tracking to Congress. Agency Comments and Our Evaluation: We provided a draft of our report to OMB, ODNI, and OPM. In response to this draft, we received oral comments from OMB and written comments from ODNI and OPM. All three agencies concurred with all of our recommendations. OMB, ODNI, DOD (through ODNI), and OPM also provided us with technical comments, which we incorporated in this report, as appropriate. ODNI and OPM's written comments are reprinted in their entirety in appendixes II and III, respectively. In oral comments, OMB generally concurred with both of our recommendations directed to OMB's Deputy Director of Management in the capacity as Chair of the Performance Accountability Council. OMB noted the report's thoroughness and that it highlighted the significant progress that has been made to improve the timeliness of security clearance determinations. In response to our recommendations, OMB described some of the steps that the Performance Accountability Council was taking to address the recommendations. Regarding our first recommendation, OMB noted that the Performance Accountability Council was committed to the timeliness and reciprocity goals of IRTPA and that it was working with agencies currently not meeting the IRTPA timeliness goals by taking steps to assist these agencies. Regarding our second recommendation to develop additional performance measures to track reciprocity, OMB stated that the Performance Accountability Council is working to develop these additional metrics. In written comments, ODNI and OPM both noted the significant overall progress that has been made in the reform efforts. Specifically, ODNI noted that DOD, with the majority of clearances, achieved timeliness goals for adjudications for fiscal year 2010. As we noted in our report, significant overall progress has been made, largely attributable to DOD because the department represents a vast majority of the initial clearances. In agreeing with and providing comments related to our recommendations, ODNI described a number of ongoing and future actions related to our recommendations. For example, ODNI stated that it is working through the Joint Reform Team to assist executive agencies that are not meeting IRTPA objectives to develop mitigation strategies and will report these strategies to Congress in its February 2011 IRTPA Annual Report. Similarly, ODNI stated that it will continue to work with the Performance Accountability Council's Performance Management and Measures subcommittee to develop additional measures for reciprocity, timeliness, and quality, which will also be included in its annual report to Congress. We are encouraged to see a continued commitment by executive leaders of the security clearance reform effort and if implemented in accordance with our recommendations, the ODNI's actions appear to be a positive step in helping sustain the momentum of security clearance reform. In addition to agreeing with our recommendations, OPM provided four specific comments: * First, OPM provided comments on the timeliness data provided by the Performance Accountability Council that we used to frame agency compliance with IRTPA timeliness objectives. Specifically, OPM stated in its written comments that some of the Performance Accountability Council's timeliness data for the second and third quarters of fiscal year 2010 varies with the data that OPM collects and reports to the Performance Accountability Council. We acknowledge that in some instances there are discrepancies between the timeliness data provided by OPM and the timeliness data that the Performance Accountability Council provided to us. In some cases, OPM asserts that timeliness data for investigations is marginally better than reported by the Performance Accountability Council and in other instances, is marginally worse. However, none of the discrepancies reported by OPM affects our findings as it relates to agency compliance with IRTPA timeliness objectives for the period reported. Agencies we note in figure 2 continue to either meet or not meet the IRTPA timeliness goals. As we note in our methodology, for the purposes of this report, we ultimately selected and relied on data provided by the Performance Accountability Council's Subcommittee on Performance Management and Measures. The Performance Accountability Council is responsible for collecting and reporting agency timeliness data to Congress and providing oversight to agencies regarding the timeliness of personnel security clearance processes. The data were provided by the Performance Accountability Council in August 2010. We conducted a series of data reliability interviews with knowledgeable officials with the Performance Accountability Council's subcommittee and concluded that the data provided were sufficiently reliable for our purposes. * Second, OPM also provided comments related to a section of our report on investigation services quality and cost. Specifically, OPM noted in its comments that they felt some policies are ambiguous and that there are customer misperceptions of the sufficiency of OPM investigations. Further, OPM noted that there is no policy requiring police and criminal records to be included in its investigative reports. The ODNI provided a similar technical comment and we made changes, as appropriate, to reflect this point. However, related to OPM's comment on agency misperception of the sufficiency of OPM investigations, we spoke with, and note in our report, several agencies stated challenges related to deficient investigative reports provided by OPM. According to these agencies--including DOD, which constitutes the vast majority of personnel security clearances in the federal government--the deficiencies in investigative reports slows their agencies ability to make adjudicative decisions. In fact, as we note in this report and based on our prior work, documentation was incomplete for most OPM-provided investigative reports based on independent review of about 3,500 investigative reports provided to DOD.[Footnote 73] * Third, OPM suggested modifications to our discussion of quality metrics on reciprocity. In its comments, OPM noted that some of the metrics may have been developed prior to the Performance Accountability Council's response to a March 2010 congressional inquiry. We disagree with OPM's characterization of the accuracy of this section and its suggested modification for two reasons: 1) the Performance Accountability Council submitted proposed metrics to congress in May 2010 in response to the congressional inquiry we already note. Our evidence is derived from this letter to congress for which the Performance Accountability Council--including OPM--and GAO are signatories; and 2) OMB, in its capacity as chair of the Performance Accountability Council, stated in its technical comments that referring to the proposed metrics as originating from the Performance Accountability Council was appropriate. * Finally, OPM noted in its comments pertaining to data ownership, that OPM can not provide information from investigations it did not conduct to another agency it did not own. Instead, OPM noted that requests for these investigative records must be referred to the owning agency. As a result, we incorporated changes based on this comment as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 12 days from the report date. We will then send copies of this report to the Senate Appropriations Committee, Senate Committee on Homeland Security and Governmental Affairs, Senate Select Committee on Intelligence, Senate Armed Services Committee, House Appropriations Committee, House Oversight and Government Reform Committee, and House Armed Services Committee and to members of the Performance Accountability Council, including the Director of the Office of Management and Budget, Office of the Director of National Intelligence, Secretary of the Department of Defense, and the Director of the Office of Personnel Management. In addition, the report will be available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov]. If you or your staff have any questions about this report, please contact me at (202) 512-3604 or farrellb@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IV. Signed by: Brenda S. Farrell: Director, Defense Capabilities and Management: [End of section] Appendix I: Scope and Methodology: Scope: In conducting our review of the ongoing efforts to reform the personnel security clearance process, the scope of work included the Office of Personnel Management (OPM), the Department of Defense (DOD), and the Office of the Director of National Intelligence (ODNI) as members of the Performance Accountability Council. Our review included select members of the Intelligence Community, including the Under Secretary of Defense for Intelligence, the Central Intelligence Agency, Defense Intelligence Agency, Federal Bureau of Investigation, National Geospatial-Intelligence Agency, National Reconnaissance Office, National Security Agency, and the Department of State. Our review also included six additional executive branch agencies, including the Departments of Energy, Health and Human Services, Homeland Security, Justice, the Treasury, and Veterans Affairs. These agencies were selected based on the volume of initial personnel security clearances they process per year for civilians, military, and industrial personnel, and their use of OPM to conduct background investigations. Methodology: To assess the overall personnel security clearance reform efforts, as well as each of our objectives, we obtained relevant documentation and interviewed key federal officials from the following organizations: * Office of Personnel Management; * The Department of Defense; * The Office of the Under Secretary of Defense for Intelligence, * Department of the Army, Central Clearance Facility, * Department of the Navy Central Adjudication Facility, * Department of the Air Force Central Adjudication Facility, * Defense Industrial Security Clearance Office Central Adjudication Facility, * Defense Intelligence Agency, * National Security Agency, * Defense Office of Hearings and Appeals, * Defense Personnel Security Research Center, * Business Transformation Agency, * Joint Chiefs of Staff, and: * Washington Headquarters Services. * Office of the Director of National Intelligence; * Department of Energy; * Department of Health and Human Services; * Department of Homeland Security; * Department of Justice; * Department of the Treasury; and: * Department of Veterans Affairs. We conducted a roundtable discussion with members of the Intelligence Community, including officials from the Office of the Director of National Intelligence, the Under Secretary of Defense for Intelligence, the Central Intelligence Agency, Defense Intelligence Agency, Federal Bureau of Investigation, National Geospatial- Intelligence Agency, National Reconnaissance Office, National Security Agency, and the Department of State to discuss broader challenges the Intelligence Community faces regarding timeliness, information sharing, and reciprocity. To assess the extent to which executive branch agencies investigate and adjudicate initial personnel security clearance applications in a timely manner, we analyzed the timeliness objectives specified in the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) and reviewed the self-reported timeliness data contained in the Performance Accountability Council's Security and Suitability Process Reform Strategic Framework[Footnote 74] provided by the Performance Accountability Council Subcommittee on Performance Management and Measures for the first three quarters of fiscal year 2010. The data provided by the Performance Accountability Council was provided in August 2010. Further, we obtained and reviewed timeliness data provided by OPM for agencies that utilize OPM as the investigative service provider for the first three quarters of fiscal year 2010. While IRTPA sets timeliness objectives for 90 percent of cases, the Performance Accountability Council excludes certain cases from its analysis before calculating and reporting on agency timeliness. For example, OPM officials stated that cases that are returned to OPM for additional work, such as work to address missing scope items, are excluded from timeliness data. Due to the additional investigative work involved with these cases and the additional time required for agencies to negotiate the terms of the requests, these cases take longer to complete. Furthermore, the Performance Accountability Council excludes certain cases involving industrial personnel. DOD's Defense Industrial Security Clearance Office adjudicates clearances for industrial personnel. When the Defense Industrial Security Clearance Office cannot mitigate issues and has decided that a denial or revocation is warranted, they submit the cases to the Defense Office of Hearings and Appeals. Timeliness information on cases pending with Defense Office of Hearings and Appeals is excluded from DOD's timeliness data. Moreover, by not including end-to-end timeliness information on cases that require additional work in the query for calculating the fastest 90 percent of cases, the Performance Accountability Council is excluding many of the cases that took the longest to complete and, therefore, the average for agency timeliness may be reduced. We assessed the reliability of the data by reviewing the existing data and interviewing agency officials knowledgeable about how the data was collected, stored, and reported, as well as the quality assurance steps that were taken to ensure completeness and accuracy. We determined these data were sufficiently reliable for purposes of our audit. Additionally, we supplemented this data reliability analysis with information obtained through our interviews with executive branch agencies about their timeliness performance in fiscal year 2010 to date. These agencies were selected based on the volume of security clearances processed annually, among other things. [Footnote 75] To assess the extent to which executive branch agencies accept previously granted security clearances and the challenges, if any, that exist related to reciprocity, we reviewed the requirements specified in IRTPA and analyzed Executive Orders, OMB memorandums, ODNI policy guidance and directives, congressional reports, and individual agency guidance related to reciprocity. We also analyzed existing and planned metrics developed by the Performance Accountability Council to track the extent to which reciprocity is honored. We met with security officials, managers, and adjudicators from DOD, the Intelligence Community, and a non-probability sample of additional executive branch agencies. We supplemented this analysis with information obtained from a roundtable discussion that we conducted with representatives of Intelligence Community agencies to examine the challenges these agencies face as it relates to granting reciprocity. Because the scope of this engagement is limited to security clearances, we did not analyze the extent to which agencies reciprocally accept prior suitability investigations and adjudications. For the purposes of our report reciprocity is an agency's acceptance of a background investigation or clearance determination completed by another authorized investigative or adjudicative agency. We excluded from the scope of our work issues related to access to facilities, detailed employees, or classified information. To assess the extent to which executive branch agencies share personnel clearance information in a single, integrated database, we reviewed and analyzed the Joint Reform Team's Enterprise Information Technology Strategy, the Performance Accountability Council's 2010 Strategic Framework, and the two most recent Joint Reform Team Security and Suitability Process Reform reports.[Footnote 76] We interviewed knowledgeable officials within OPM, ODNI, and DOD to determine what, if any, limitations, barriers, or challenges existed in creating a single, integrated database. In addition, we received demonstrations of both OPM and DOD's databases and interviewed officials to determine how they shared information about personnel who hold or are seeking security clearances in the absence of a single, integrated database. We conducted this performance audit from October 2009 through November 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our objectives. [End of section] Appendix II: Comments from the Office of the Director of National Intelligence: Director Of National Intelligence: Washington, Dc 20511: November 8, 2010: Gene L. Dodaro: Acting Comptroller General of the United States: U.S. Government Accountability Office: Washington, DC 20548: Dear Mr, Dodaro: Thank you for the opportunity to respond to your proposed report entitled Personnel Security Clearances: Progress Has Been Made to Improve Timeliness but Continued Oversight is Needed to Sustain Momentum (GAO-11-65). This report is a fair and thorough assessment of the Personnel Security Clearance reform effort's progress to date. I have enclosed my feedback on your report's observations and recommendations. The Office of the Director of National Intelligence received input on your report from the Department of Defense, the Office of Personnel Management, and the Intelligence Community round table participants. As GAO noted, significant overall progress has been made to improve the timeliness of personnel security clearance investigations and adjudications. The reform effort, led by the Performance Accountability Council, continues to implement reforms designed to provide consistent timeliness, improve quality and enable reciprocity to the fullest extent practical across Executive Branch agencies. We look forward to working with you in the future as we continue the reform process. Sincerely, Signed by: James R. Clapper: Attachment: 1. GAO Draft Report: cc: Ms. Brenda Farrell: [End of letter] Office of the Director of National Intelligence Response: GAO Draft Report: Personnel Security Clearances: Progress Has Been Made to Improve Timeliness but Continued Oversight is Needed to Sustain Momentum (GA0-11-65): GAO Observation: Significant progress has been made to improve the timeliness of investigation and adjudication of personnel security clearances, which was attributable to Department of Defense (DOD) whose clearances comprise about 90% of government-wide clearances. Although the majority of clearances are processed within the IRTPA 60- day objective, individual agency timeliness varies and they continue to face a number of challenges for meeting timelines objectives, including personnel limitations, variances among agencies in adopting information technology caused by resources constraints, and additional agency-specific requirements that must be met before granting a security clearance. ODNI Response: I agree with GAO's observation that significant timeliness improvements have been made which are due in large part to implementation of reformed electronic, automated personnel security processes. It should be further noted that DOD, with the volume majority of clearances, achieved adjudicative timeliness well under the 20 day goal for the entire fiscal year which allowed for the combined Executive Branch investigation/adjudication timeliness to fall within the 60 days prescribed by IRTPA. GAO Recommendation 1: GAO recommends that the Performance Accountability Council collaborate with executive agencies that are not yet achieving the 60-day timeliness objective to take the following actions: 1) identify challenges to timeliness, 2) develop mitigation strategies to enable each agency to comply with IRTPA timeliness objectives, 3) set timelines for accomplishing the required actions, 4) monitor agency progress, and 5) report on these plans and progress in the annual report to Congress. ODNI Response: Concur. The Security Executive Agent, through Joint Reform Team (JRT) efforts, collaborates in a variety of ways with all executive agencies to assist them in improving timeliness, reciprocity, quality, and other strategic goals outlined in IRTPA. Agencies submitted timelines for reform in March 2009 via a JRT- developed plan of actions and milestone (POA&M) template. The JRT monitors agency progress against their original plans, as well as challenges to implementation and mitigation strategies if the agency is behind schedule, through the agency-submitted quarterly updates and reports progress to the Performance Accountability Council. In addition, the JRT is conducting agency-focused site visits to assist agencies by addressing issues GAO identified for action. The JRT will use these meetings to help agencies further define the challenges to timeliness and reform implementation and to develop tailored mitigation plans to achieve reform goals. To provide Congress additional insight to these activities, the Security Executive Agent will address agency challenges and mitigation strategies in the February 2011 IRTPA Annual Report. GAO Recommendation 2: GAO recommends that the Performance Accountability Council develop comprehensive, standardized metrics to track reciprocity and report the findings from the expanded tracking to Congress. ODNI Response: The Security Executive Agent, in partnership with the Performance Accountability Council's Performance Management and Measures subcommittee, continues to develop additional performance measures for reciprocity, timeliness, and quality. The Security Executive Agent will include such measures in its annual report to Congress. [End of section] Appendix III: Comments from the Office of Personnel Management: United States Office Of Personnel Management: The Director: Washington, DC 20415: November 1, 2010: Ms. Brenda S. Farrell: Director, Defense Capabilities and Management: U.S. Government Accountability Office (GAO): Washington, DC 20548: Dear Ms. Farrell: Thank you for the opportunity to respond to the proposed report entitled Personnel Security Clearances: Progress has Been Made to Improve Timeliness but Continued Oversight is Needed to Sustain Momentum (GAO-11-65). The U.S. Office of Personnel Management (OPM) is pleased to see that the report recognizes the progress that has been made in the security clearance process and agrees with the recommendations that GAO has made at the end of its report. Our comments to the proposed report are enclosed for your review and consideration. Please do not hesitate to contact Merton Miller, Deputy Associate Director for External Affairs of OPM's Federal Investigative Service at 202-606-1042 or Tania Shand, Director of OPM's Congressional and Legislative Affairs at 202-606-1300, if you have any further questions or wish to discuss our comments. Sincerely, Signed by: John Berry: Director: Enclosure: [End of letter] Recommended Adjustments to the Draft Statement of Fact, GAO's Review of Personnel Security Clearance Reform (GAO-11-65): 1. Page 20, Figure 2, revise to include percentage of OPM workload and correct data: DoD (92.5%)- Second Quarter - replace "45" with "42", DHS (3.5%), DOE (1.2%) - Second Quarter and Third Quarter - replace "45" and "44" with "42" and "42" respectively, DOI (0.8%)- Third Quarter - replace "63" with "65", Treasury (0.2%)- Second Quarter - replace "56" with "55", HHS (0.3%), VA (0.0%) - Second Quarter and Third Quarter-replace "78" and "70" with "81" and "63" respectively. Rationale: Accuracy. Adding workload percentage and correcting timeliness data will improve accuracy and clarity for the reader. This timeliness data provided by ODNI is not consistent with OPM's data. The inconsistency between OPM and ODNI's data is based upon the ODNI's inability to identify the fastest 90% "Initial" population. ODNI identifies the fastest 90% of the Top Secret population and then identifies the fastest 90% of the Secret/Confidential population and combines the two to determine the average timeliness of the 90% of that population. ODNI also combines data from the Intelligence Community that would not be included in OPM's data. Additionally, the timeliness data reflected in the chart is reflective of investigations with adjudication actions reported during those periods versus the investigation "closing" timeliness as reported by OPM and responsive to the Intelligence Reform and Terrorism Act of 2004. The data for the non-delegated agencies represented in this chart is accurately provided by OPM, and accepted by ODNI and approved by OMB on a quarterly basis. Given that GAO is not questioning the accuracy of the data provided by OPM, these adjustments to the GAO data are appropriate. 2. Page 24, first paragraph, revise as follows: "Investigation services quality and cost." Officials representing agencies that use OPM as their investigative service provider cited challenges related to deficient investigative reports as a factor that slows agencies abilities to make adjudicative decisions-For example, some agencies noted that OPM investigative reports do not include complete copies of associated police reports and criminal record checks. We noted in our prior work that documentation was incomplete for most OPM-provided investigative reports based on independent review of about 3,500 investigative reports. We also noted in our previous work that incomplete investigative documentation may lead to increases in the time it take to complete the clearance process and in the overall costs of the process. In response, OPM officials stated that ambiguous policies and customer misunderstanding of the investigative coverage limitations contribute significantly to perceptions of the sufficiency of OPM products. For instance, OPM officials state that OPM provides a summary synopsis of police and criminal record review findings, and asserts there is no policy requiring inclusion of copies of the original records while some adjudicative agency personnel disagree. On the other hand, some investigative coverage requirements are not satisfied due to coverage limitations as illustrated by the absence of subject interviews unobtainable because the subject is in a war zone, or the absence of employment verification when the employing entity does not permit release of the information. This confusion between requirements and exceptions and limitations on investigative collections may unnecessarily delay adjudications and lead agencies back to OPM for more information. Several agency officials state that in order to avoid further costs or delays that would result from working with OPM, they often choose to perform additional steps internally to obtain missing information, clarify or explain issues identified in investigative report, or gather evidence for issue resolution or mitigation. Rationale: Accuracy. Most of OPM customer agencies were not interviewed. Of those cited, GAO's quality example illustrates the clear disconnect between expectations and policy requirements. That disconnect has its roots in policy ambiguity, which is currently being addressed by reform efforts to revise investigative standards to clearly state requirements, to define collateral coverage standards when primary coverage is unobtainable, and to direct when waivers, deviations and exceptions are appropriate and acceptable. Having clear content standards will go a long way to assist the investigative service provider in fulfilling adjudicative expectations, and the adjudicator in concluding determinations without concern that they will be second guessed. Finally, the contrast between intelligence community circumstances (serving a single, small volume requirement) with OPM circumstances (serving over 90% of the federal government and 200 plus agencies with multiple contracts) on the treatment of "costs" is not relevant. Intelligence community entities are all doing very in- depth investigations to one standard to meet one agencies expectation, and they have the added ability to insert adjudicator prerogative into the final determination of sufficiency. OPM is governed by revolving fund (fee-for-service rules), and must work with contracts to cover a variety of investigative products, policies and customer expectations. This is another situation in which having clear standards will do more to eliminate the need for agencies to revisit investigative products with OPM, because they will permit OPM to satisfy the expectations the first time. 3. Page 33, starts three lines from bottom - "Similarly, the other metrics proposed by the Performance Accountability Council...", delete the entire bulleted paragraph. Rationale: Accuracy. The metrics that are identified as "proposed" by the Joint Reform team were in fact developed by the Management and Metrics Subcommittee of the Performance Accountability Council some time ago and have all been regularly included in the quarterly reports that OPM prepares for OMB and Congress. In fact, the first proposed metric for "number of duplicate requests for investigation" is previously mentioned by GAO earlier on page 33 of the draft report where it states that "OPM created a metric in early 2009 to track reciprocity..." This is the "duplication" measurement indicated as "proposed" at the bottom of the page. The other metrics can be found in the quarterly report under the sections on e-QIP. 4. Page 36, last sentence in first paragraph should be revised to clarify the reason OPM is unable to provide information from the investigation provided by another agency. "For example, OPM is not authorized to provide information it does not have to another agency. When investigations are conducted by agencies with delegated authority, the reports are indexed in OPM's SII/CVS but the actual reports are owned and maintained by the investigating agency. Requests for these investigative records must be referred to the owner." Rationale: Clarity. As written the sentence implied a "willingness" issue. The revised language makes the point by adding necessary details. [End of section] Appendix IV: GAO Contact and Staff Acknowledgments: GAO Contact: Brenda S. Farrell, (202) 512-3604 or farrellb@gao.gov: Acknowledgments: In addition to the contact named above, Liz McNally (Assistant Director); David Moser (Assistant Director); James Ashley; Joseph M. Capuano; Sara Cradic; Cindy Gilbert; Linda Keefer; James Krustapentus; Greg Marchand; Richard Powelson; Jillena Roberts; and Amie Steele made key contributions to this report. [End of section] Related GAO Products: DOD Personnel Security Clearance Reform: Preliminary Observations on Timeliness and Quality. [hyperlink, http://www.gao.gov/products/GAO-11-185T]. Washington, D.C.: November 16, 2010. Privacy: OPM Should Better Monitor Implementation of Privacy-Related Policies and Procedures for Background Investigations. [hyperlink, http://www.gao.gov/products/GAO-10-849]. Washington, D.C.: September 7, 2010. Personnel Security Clearances: An Outcome-Focused Strategy and Comprehensive Reporting of Timeliness and Quality Would Provide Greater Visibility over the Clearance Process. [hyperlink, http://www.gao.gov/products/GAO-10-117T]. Washington, D.C.: October 1, 2009. Personnel Security Clearances: Progress Has Been Made to Reduce Delays but Further Actions Are Needed to Enhance Quality and Sustain Reform Efforts. [hyperlink, http://www.gao.gov/products/GAO-09-684T]. Washington, D.C.: September 15, 2009. Personnel Security Clearances: An Outcome-Focused Strategy Is Needed to Guide Implementation of the Reformed Clearance Process. [hyperlink, http://www.gao.gov/products/GAO-09-488]. Washington, D.C.: May 19, 2009. DOD Personnel Clearances: Comprehensive Timeliness Reporting, Complete Clearance Documentation, and Quality Measures Are Needed to Further Improve the Clearance Process. [hyperlink, http://www.gao.gov/products/GAO-09-400]. Washington, D.C.: May 19, 2009. High-Risk Series: An Update. [hyperlink, http://www.gao.gov/products/GAO-09-271]. Washington, D.C.: January 22, 2009. DOD Personnel Clearances: Preliminary Observations about Timeliness and Quality. [hyperlink, http://www.gao.gov/products/GAO-09-261R]. Washington, D.C.: December 19, 2008. Personnel Security Clearances: Preliminary Observations on Joint Reform Efforts to Improve the Governmentwide Clearance Eligibility Process. [hyperlink, http://www.gao.gov/products/GAO-08-1050T]. Washington, D.C.: July 30, 2008. Personnel Clearances: Questions for the Record Regarding Security Clearance Reform. [hyperlink, http://www.gao.gov/products/GAO-08-965R]. Washington, D.C.: July 14, 2008. Personnel Clearances: Key Factors for Reforming the Security Clearance Process. [hyperlink, http://www.gao.gov/products/GAO-08-776T]. Washington, D.C.: May 22, 2008. Employee Security: Implementation of Identification Cards and DOD's Personnel Security Clearance Program Need Improvement. [hyperlink, http://www.gao.gov/products/GAO-08-551T]. Washington, D.C.: April 9, 2008. DOD Personnel Clearances: Questions for the Record Related to the Quality and Timeliness of Clearances. [hyperlink, http://www.gao.gov/products/GAO-08-580R]. Washington D.C.: March 25, 2008. DOD Personnel Clearances: DOD Faces Multiple Challenges in Its Efforts to Improve Clearance Processes for Industry Personnel. [hyperlink, http://www.gao.gov/products/GAO-08-470T]. Washington, D.C.: February 12, 2008. Personnel Clearances: Key Factors to Consider in Efforts to Reform Security Clearance Processes. [hyperlink, http://www.gao.gov/products/GAO-08-352T]. Washington, D.C.: February 27, 2008. DOD Personnel Clearances: Improved Annual Reporting Would Enable More Informed Congressional Oversight. [hyperlink, http://www.gao.gov/products/GAO-08-350]. Washington, D.C.: February 13, 2008. DOD Personnel Clearances: Delays and Inadequate Documentation Found for Industry Personnel. [hyperlink, http://www.gao.gov/products/GAO-07-842T]. Washington, D.C.: May 17, 2007. High Risk Series: An Update. [hyperlink, http://www.gao.gov/products/GAO-07-310]. Washington, D.C.: January 2007. DOD Personnel Clearances: Additional OMB Actions Are Needed to Improve the Security Clearance Process. [hyperlink, http://www.gao.gov/products/GAO-06-1070]. Washington, D.C.: September 28, 2006. DOD Personnel Clearances: Questions and Answers for the Record Following the Second in a Series of Hearings on Fixing the Security Clearance Process. [hyperlink, http://www.gao.gov/products/GAO-06-693R]. Washington, D.C.: June 14, 2006. DOD Personnel Clearances: New Concerns Slow Processing of Clearances for Industry Personnel. [hyperlink, http://www.gao.gov/products/GAO-06-748T]. Washington, D.C.: May 17, 2006. DOD Personnel Clearances: Funding Challenges and Other Impediments Slow Clearances for Industry Personnel. [hyperlink, http://www.gao.gov/products/GAO-06-747T]. Washington, D.C.: May 17, 2006. Questions for the Record Related to DOD's Personnel Security Clearance Program and the Government Plan for Improving the Clearance Process. [hyperlink, http://www.gao.gov/products/GAO-06-323R]. Washington, D.C.: January 17, 2006. DOD Personnel Clearances: Government Plan Addresses Some Long-standing Problems with DOD's Program, But Concerns Remain. [hyperlink, http://www.gao.gov/products/GAO-06-233T]. Washington, D.C.: November 9, 2005. DOD Personnel Clearances: Some Progress Has Been Made but Hurdles Remain to Overcome the Challenges That Led to GAO's High-Risk Designation. [hyperlink, http://www.gao.gov/products/GAO-05-842T]. Washington, D.C.: June 28, 2005. High-Risk Series: An Update. [hyperlink, http://www.gao.gov/products/GAO-05-207]. Washington, D.C.: January 2005. [End of section] Footnotes: [1] GAO, High-Risk Series: An Update, [hyperlink, http://www.gao.gov/products/GAO-05-207] (Washington, D.C.: January 2005). [2] GAO, High-Risk Series: An Update, [hyperlink, http://www.gao.gov/products/GAO-07-310] (Washington, D.C.: January 2007); and High-Risk Series: An Update, [hyperlink, http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: January 2009). [3] GAO, DOD Personnel Clearances: Comprehensive Timeliness Reporting, Complete Clearance Documentation and Quality Measures Are Needed to Further Improve the Clearance Process, [hyperlink, http://www.gao.gov/products/GAO-09-400] (Washington, D.C.: May 19, 2009). [4] Pub. L. No. 108-458, §3001 (2004) (codified at 50 U.S.C. 435b). While IRTPA was a far-reaching act with many broad implications, our references to it throughout this report pertain solely to section 3001, unless otherwise specified. [5] This team also now includes representatives of the Office of Management and Budget and Office of Personnel Management. [6] GAO, High-Risk Series: An Update, [hyperlink, http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: January 2009). [7] H.R. Rep. No. 110-916 (2008). [8] In the last 3 years, GAO has also testified on security clearance reform before (1) the Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia of the Senate Committee on Homeland Security and Governmental Affairs, (2) the Subcommittee on Government Management, Organization, and Procurement, House Committee on Oversight and Government Reform, and (3) the Subcommittee on Readiness, House Committee on Armed Services. [9] Pub. L. No. 111-259, § 367 (2010). [10] [hyperlink, http://www.gao.gov/products/GAO-09-400]; and Personnel Security Clearances: An Outcome-Focused Strategy Is Needed to Guide Implementation of the Reformed Clearance Process, [hyperlink, http://www.gao.gov/products/GAO-09-488] (Washington, D.C.: May 19, 2009). [11] We met with officials from the Central Intelligence Agency, Defense Intelligence Agency, Federal Bureau of Investigation, National Geospatial-Intelligence Agency, National Reconnaissance Office, National Security Agency, and the Department of State. [12] We met with officials from the Departments of Energy, Health and Human Services, Homeland Security, Justice, the Treasury, and Veterans Affairs. [13] We selected agencies based on their ability to meet a combination of one or more of the following criteria: (1) utilizes Office of Personnel Management to conduct security clearance investigations, (2) conducts an average of 5,000 cases per year, (3) is an Intelligence Community agency, or (4) is a member of the Performance Accountability Council. Because this is a non-probability sample, our findings do not generalize to the agencies that we did not include in our review. [14] Department of Defense: Air Force, Army, Navy, Defense Industrial Security Clearance Office, Defense Intelligence Agency, Defense Office of Hearings and Appeals, Washington Headquarters Services, Joint Chiefs of Staff Central Adjudication Facilities, Business Transformation Agency, Defense Personnel Security Research Center, Office of the Under Secretary of Defense for Intelligence, and the National Security Agency; Intelligence Community: National Geospatial- Intelligence Agency, National Reconnaissance Office, Central Intelligence Agency, Federal Bureau of Investigation, Department of State Bureau of Intelligence and Research, and Office of the Director of National Intelligence; and additional executive branch agencies: Health and Human Services, Department of Energy, Department of Homeland Security, Department of the Treasury, Department of Justice, Office of Personnel Management, and Department of Veterans Affairs. [15] Performance Accountability Council, Security and Suitability Process Reform Strategic Framework (Washington, D.C.: February 2010). This report was created under the Performance Accountability Council by the Joint Reform Team. [16] Performance Accountability Council, Security and Suitability Process Reform Strategic Framework (Washington, D.C.: February 2010). [17] Our analysis of timeliness data does not include the following elements of the agencies in our review: Department of Homeland Security: Homeland Security Headquarters, Immigration and Customs Enforcement, U.S. Secret Service, U.S. Customs and Border Protection, select positions in the U.S. Coast Guard; Department of Justice: Bureau of Alcohol, Tobacco, Firearms and Explosives; and Department of the Treasury: Bureau of the Public Debt, Bureau of Engraving and Printing. [18] These databases included DOD's Joint Personnel Adjudication System, OPM's Central Verification System, and the Intelligence Community's Scattered Castles. [19] Pub. L. No. 108-458, § 3001 (2004) (codified at 50 U.S.C. § 435b). According to IRTPA, this period shall include a period of not longer than 40 days to complete the investigative phases of the clearance review and a period of not longer than 20 days to complete the adjudicative phase of the clearance review. These measures apply to initial personnel security clearances (i.e., cases in which individuals who enter positions in government or industry that require a clearance do not have a clearance or have not been granted reciprocity). [20] Performance Accountability Council, Security and Suitability Process Reform Strategic Framework (Washington, D.C.: February 2010). [21] IRTPA's new timeliness objectives became effective as of December 17, 2009, midway through the first quarter of the fiscal year. This analysis is based on the methodology used by the Performance Accountability Council that counts the fastest end-to-end cases based only on completed cases adjudicated by the respective agencies in the specified quarter of the fiscal year. [22] The Intelligence Authorization Act for Fiscal Year 2010 extended this reporting requirement beyond 2011. Pub. L. No. 111-259, § 367 (2010). [23] Pub. L. No. 108-458, § 3001(d) (2004) (codified at 50 U.S.C. 435b(d)). [24] ODNI, Intelligence Community Policy Guidance 704.4, Reciprocity of Personnel Security Clearance and Access Determinations (Oct. 2, 2008). [25] Office of Management and Budget, Memorandum for Deputies of Executive Departments and Agencies: Reciprocal Recognition of Existing Personnel Security Clearance (Dec. 12, 2005). [26] GAO, Personnel Clearances: Key Factors to Consider in Efforts to Reform Security Clearance Processes, [hyperlink, http://www.gao.gov/products/GAO-08-352T] (Washington, D.C.: Feb. 27, 2008). [27] Pub. L. No. 108-458, §3001(e) (2004) (codified at 50 U.S.C. § 435b(e)). [28] Performance Accountability Council, Suitability and Security Process Reform: Strategic Framework (Washington, D.C., February 2010). [29] Sensitive Compartmented Information is classified intelligence information concerning or derived from intelligence sources, methods, or analytical processes that is required to be protected within formal access control systems established and overseen by the Director of National Intelligence. A Special Access Program is a program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level. [30] According to the Performance Accountability Council's Strategic Framework, the federal government conducts almost 900,000 national security investigations a year. [31] If a clearance holder has a long-term need to access classified information, the clearance must be renewed: top secret, 5 years; secret, 10 years; and confidential, 15 years. [32] Determinations of suitability for government employment in positions in the competitive service and for career appointment in the Senior Executive Service include consideration of aspects of an individual's character or conduct that may have an impact on the integrity or efficiency of their service. Exec. Order No. 13467, Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information, at 1.2(I) (June 30, 2008) (citing 5 C.F.R. Part 731). [33] [hyperlink, http://www.gao.gov/products/GAO-05-207]; [hyperlink, http://www.gao.gov/products/GAO-07-310]; and [hyperlink, http://www.gao.gov/products/GAO-09-271]. [34] Exec. Order No. 13381, Strengthening Processes Relating to Determining Eligibility for Access to Classified National Security Information (June 27, 2005). This order was revoked by Exec. Order No. 13467, Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information (June 30, 2008). [35] Exec. Order No. 13467, Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information (June 30, 2008). [36] Pub. L. No. 108-458, §3001 (2004). IRTPA timeliness objectives apply only to initial personnel security clearances. Initial clearances involves cases in which individuals who enter positions in government or industry that require a clearance do not have a clearance or have not been granted reciprocity to honor a previously granted clearance. [37] Effective December 17, 2009, this IRTPA objective replaced the IRTPA requirement that determinations on 80 percent of initial clearances be made within an average of 120 days or less (90 days for investigations and 30 days for adjudications). [38] Performance Accountability Council, Security and Suitability Process Reform Strategic Framework (Washington, D.C.: February 2010). [39] This analysis is based on the methodology used by the Performance Accountability Council that counts the fastest end-to-end cases based only on completed cases adjudicated by the respective agencies in the specified quarter of the fiscal year. [40] According to DOD officials, DOD's system for tracking and reporting security clearance case information does not differentiate between initial secret/confidential clearances and renewal secret/ confidential clearances. Therefore, the Performance Accountability Council timeliness reports on initial clearances include DOD secret/ confidential renewal cases. [41] Under Exec. Order No. 13467, Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information, sec. 2.3(c)(iv)) (June 30, 2008), the Director of National Intelligence, as the Security Executive Agent, has the authority to designate agencies to conduct investigations. Agencies are required to use OPM as the investigative service provider for initial clearances unless the Director of National Intelligence has provided them with delegated authority to conduct their own investigations. [42] Homeland Security Presidential Directive-12 (HSPD-12), Policies for a Common Identification Standard for Federal Employees and Contractors (August. 27, 2004). [43] Electronic delivery systems enable investigative service providers to electronically transmit completed investigative files to adjudicative agencies. Electronic adjudication capabilities determine if the subject meets the adjudicative guidelines based on investigative reports. These capabilities enable adjudicative determinations for cases that do not contain issues that may affect an individual's eligibility to access classified information or systems to be made. Currently, electronic adjudication systems are only approved to adjudicate secret or confidential clearance cases. [44] Case management workflow tools, such as DOD's Case Adjudication Tracking System, are used by adjudicators to document the completeness of investigative files, manage the adjudication process, and document decisions made and actions taken regarding a case. The Clearance Adjudication Tracking System provides both electronic delivery and electronic adjudication capabilities. [45] These DOD component agencies include the Joint Chiefs of Staff, Army, Navy, and the Defense Office of Hearings and Appeals. The Defense Intelligence Agency, who adjudicates certain cases for the Joint Chiefs of Staff and Washington Headquarters Services, provided similar comments. [46] [hyperlink, http://www.gao.gov/products/GAO-09-400]. [47] [hyperlink, http://www.gao.gov/products/GAO-09-400]. [48] GAO, DOD Personnel Clearances: Government Plan Addresses Some Longstanding Problems with DOD's Program, But Concerns Remain, [hyperlink, http://www.gao.gov/products/GAO-06-233T] (Washington, D.C.: Nov. 9, 2005). [49] H.R. Rep. No. 110-916 (2008). [50] ODNI, Intelligence Community Policy Guidance 704.4, Reciprocity of Personnel Security Clearance and Access Determinations (Oct. 2, 2008). [51] Office of Management and Budget, Memorandum for Deputies of Executive Departments and Agencies: Reciprocal Recognition of Existing Personnel Security Clearances (Dec. 12, 2005); Office of Management and Budget, Memorandum for Deputies of Executive Departments and Agencies: Reciprocal Recognition of Existing Personnel Security Clearances (July 17, 2006). [52] Intelligence Community Standard 2008-700-1 defines scope as the time period to be covered and the sources of information to be contacted during the prescribed course of a personnel security investigation. OMB considers significant scope deficiencies to be deviations. Therefore, agencies are not required to honor a previous clearance that is not "in-scope". Furthermore, challenges identified in this section of the report may not apply to "out-of-scope" clearances. [53] According to Intelligence Community Policy Guidance Number 704.4, conditions, deviations, and waivers are defined as: (1) condition: access eligibility granted or continued with the provision that additional security measures shall be required; (2) deviation: access eligibility granted or continued despite either a significant gap in coverage or scope in the investigation or an out-of-date investigation; (3) waiver: access eligibility granted or continued despite the presence of substantial issue information that would normally preclude access. [54] Joint Security and Suitability Reform Team, Security and Suitability Process Reform (December 2008). [55] Exec. Order No. 13488, Granting Reciprocity on Excepted Service and Federal Contractor Employee Fitness and Reinvestigating Individuals in Positions of Public Trust (Jan. 16, 2009). [56] Memorandum from John Berry, Director, Office of Personnel Management, to Heads of Executive Departments and Agencies, Guidance on Implementing Executive Order 13488: Granting Reciprocity on Excepted Service and Federal Contractor Employee Fitness and Reinvestigating Individuals in Positions of Public Trust (Sept. 24, 2009). [57] [hyperlink, http://www.gao.gov/products/GAO-08-352T]. [58] [hyperlink, http://www.gao.gov/products/GAO-09-488]. [59] Executive Order 13467 established the Director of the National Intelligence as the Security Executive Agent and requires the ODNI to ensure reciprocal recognition of eligibility for access to classified information among the agencies. [60] [hyperlink, http://www.gao.gov/products/GAO-08-352T]. [61] Pub. L. No. 108-458, § 3001(e) (2004). [62] Joint Security and Suitability Reform Team, Security and Suitability Process Reform (Washington, D.C.: April 2008 and updated December 2008); Joint Security and Suitability Reform Team, Enterprise Information Technology Strategy (Washington, D.C.: Mar. 17, 2009); and Performance Accountability Council, Security and Suitability Process Reform: Strategic Framework (Washington, D.C., February 2010). [63] Joint Security and Suitability Reform Team, Enterprise Information Technology Strategy (Washington, D.C., Mar. 17, 2009). [64] Performance Accountability Council, Security and Suitability Process Reform: Strategic Framework (Washington, D.C., February 2010). [65] [5] According to OMB Memorandum M-07-16, dated May 22, 2007, "Personally Identifiable Information" refers to information which can be used to distinguish or trace an individual's identity (e.g., name, social security number, biometric records), alone or when combined with other personal or identifying information that is linked or linkable to a specific individual (e.g., date and place of birth, mother's maiden name). [66] DOD data available through this single entry point includes name, Social Security number, date and type of investigation, and clearance eligibility. [67] According to Intelligence Community Policy Guidance Number 704.4, conditions, deviations, and waivers are defined as (1) condition: access eligibility granted or continued with the provision that additional security measures shall be required; (2) deviation: access eligibility granted or continued despite either a significant gap in coverage or scope in the investigation or an out-of-date investigation; (3) waiver: access eligibility granted or continued despite the presence of substantial issue information that would normally preclude access. [68] OPM guidance for implementing Executive Order 13488 defines Excepted Service positions as those positions: (1) not in the competitive service; (2) not in the career senior executive service; (3) and not in the Intelligence Community unless covered by OPM appointing authorities. [69] The Homeland Security Presidential Directive-12, issued on August 27, 2004, requires that United States government agencies collaborate to develop a federal standard for secure and reliable forms of identification for all U.S. government employees and contractors needing regular physical access to federal facilities. [70] According to ODNI and DOD officials, Counter-Intelligence polygraphs address issues such as foreign contacts and media disclosure. Expanded Scope polygraphs address questions not reported on the application forms about criminal activity, computer misuse, and falsification of applications. [71] The non-intelligence, non-DOD agencies include the Department of Energy, Department of Justice, Department of the Treasury, Department of Homeland Security, Department of Health and Human Services, and Department of Veterans Affairs. [72] Army Central Adjudication Facility officials said that their access was based on a case by case basis. [73] [hyperlink, http://www.gao.gov/products/GAO-09-400]. [74] Performance Accountability Council, Security and Suitability Process Reform Strategic Framework (Washington, D.C.: February 2010). [75] We met with officials from the Departments of Energy, Health and Human Services, Homeland Security, Justice, the Treasury, and Veterans Affairs. We selected agencies based on their ability to meet a combination of one or more of the following criteria: (1) utilizes OPM to conduct security clearance investigations, (2) conducts an average of 5,000 cases per year, (3) is an Intelligence Community agency, or (4) is a member of the Performance Accountability Council. Because this is a non-probability sample, our findings do not generalize to the agencies that we did not include in our review. [76] Joint Security and Suitability Reform Team, Security and Suitability Process Reform (Washington, D.C.: April 2008 and updated December 2008); Joint Security and Suitability Reform Team, Enterprise Information Technology Strategy (Washington, D.C.: Mar. 17, 2009); and Performance Accountability Council, Security and Suitability Process Reform: Strategic Framework (Washington, D.C., February 2010). [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO’s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO’s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548: